메뉴 건너뛰기




Volumn 249, Issue , 2009, Pages 75-91

Quantitative Notions of Leakage for One-try Attacks

Author keywords

hypothesis testing; Information hiding; probability of error; R nyi min entropy

Indexed keywords

COMPUTER SCIENCE;

EID: 68549126859     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2009.07.085     Document Type: Article
Times cited : (149)

References (15)
  • 1
    • 0004013982 scopus 로고    scopus 로고
    • Entropy Measures and Unconditional Security in Cryptography,
    • Ph.D. thesis, Swiss Federal Institute of Technology, Zürich, Switzerland , URL
    • Cachin, C., "Entropy Measures and Unconditional Security in Cryptography," Ph.D. thesis, Swiss Federal Institute of Technology, Zürich, Switzerland (1997). URL ftp://ftp.inf.ethz.ch/pub/publications/dissertations/th12187.ps.gz
    • (1997)
    • Cachin, C.1
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • URL
    • Dodis Y., Ostrovsky R., Reyzin L., and Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput 38 (2008) 97-139. http://dx.doi.org/10.1137/060651380 URL
    • (2008) SIAM J. Comput , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 34548282543 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • Hofmann M., and Felleisen M. (Eds). POPL 2007, Nice, France, January 17-19, 2007 URL
    • Malacaria P. Assessing security threats of looping constructs. In: Hofmann M., and Felleisen M. (Eds). Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL 2007, Nice, France, January 17-19, 2007 (2007) 225-235. http://doi.acm.org/10.1145/1190216.1190251 URL
    • (2007) Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages , pp. 225-235
    • Malacaria, P.1
  • 8
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • Úlfar Erlingsson and Marco Pistoia, editor
    • Malacaria, P. and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, in: Úlfar Erlingsson and Marco Pistoia, editor, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PLAS 2008) (2008), pp. 135-146
    • (2008) Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PLAS , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 9
    • 1642355346 scopus 로고    scopus 로고
    • Moskowitz, I.S., R.E. Newman, D.P. Crepeau and A.R. Miller, Covert channels and anonymizing networks., in: S. Jajodia, P. Samarati and P.F. Syverson, editors, WPES (2003), pp. 79-88
    • Moskowitz, I.S., R.E. Newman, D.P. Crepeau and A.R. Miller, Covert channels and anonymizing networks., in: S. Jajodia, P. Samarati and P.F. Syverson, editors, WPES (2003), pp. 79-88
  • 10
    • 2642560372 scopus 로고    scopus 로고
    • Moskowitz, I.S., R.E. Newman and P.F. Syverson, Quasi-anonymous channels, in: IASTED CNIS, 2003, pp. 126-131
    • Moskowitz, I.S., R.E. Newman and P.F. Syverson, Quasi-anonymous channels, in: IASTED CNIS, 2003, pp. 126-131
  • 12
    • 41549117992 scopus 로고    scopus 로고
    • Adversaries and information leaks (tutorial)
    • Proceedings of the Third Symposium on Trustworthy Global Computing. Barthe G., and Fournet C. (Eds)
    • Smith G. Adversaries and information leaks (tutorial). In: Barthe G., and Fournet C. (Eds). Proceedings of the Third Symposium on Trustworthy Global Computing. Lecture Notes in Computer Science 4912 (2007) 383-400
    • (2007) Lecture Notes in Computer Science , vol.4912 , pp. 383-400
    • Smith, G.1
  • 13
    • 41549167219 scopus 로고    scopus 로고
    • URL
    • URL. http://dx.doi.org/10.1007/978-3-540-78663-4_25
  • 14
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. De Alfaro L. (Ed). (FOSSACS 2009)
    • Smith G. On the foundations of quantitative information flow. In: De Alfaro L. (Ed). Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. (FOSSACS 2009). Lecture Notes in Computer Science 5504 (2009) 288-302
    • (2009) Lecture Notes in Computer Science , vol.5504 , pp. 288-302
    • Smith, G.1
  • 15
    • 27944454436 scopus 로고    scopus 로고
    • Anonymity vs. information leakage in anonymity systems
    • Zhu, Y. and R. Bettati, Anonymity vs. information leakage in anonymity systems, in: Proc. of ICDCS (2005), pp. 514-524
    • (2005) Proc. of ICDCS , pp. 514-524
    • Zhu, Y.1    Bettati, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.