-
1
-
-
0004013982
-
Entropy Measures and Unconditional Security in Cryptography,
-
Ph.D. thesis, Swiss Federal Institute of Technology, Zürich, Switzerland , URL
-
Cachin, C., "Entropy Measures and Unconditional Security in Cryptography," Ph.D. thesis, Swiss Federal Institute of Technology, Zürich, Switzerland (1997). URL ftp://ftp.inf.ethz.ch/pub/publications/dissertations/th12187.ps.gz
-
(1997)
-
-
Cachin, C.1
-
4
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
Clark D., Hunt S., and Malacaria P. Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language 18 (2005) 181-199
-
(2005)
Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language
, vol.18
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
6
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
URL
-
Dodis Y., Ostrovsky R., Reyzin L., and Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput 38 (2008) 97-139. http://dx.doi.org/10.1137/060651380 URL
-
(2008)
SIAM J. Comput
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
7
-
-
34548282543
-
Assessing security threats of looping constructs
-
Hofmann M., and Felleisen M. (Eds). POPL 2007, Nice, France, January 17-19, 2007 URL
-
Malacaria P. Assessing security threats of looping constructs. In: Hofmann M., and Felleisen M. (Eds). Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL 2007, Nice, France, January 17-19, 2007 (2007) 225-235. http://doi.acm.org/10.1145/1190216.1190251 URL
-
(2007)
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 225-235
-
-
Malacaria, P.1
-
8
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Úlfar Erlingsson and Marco Pistoia, editor
-
Malacaria, P. and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, in: Úlfar Erlingsson and Marco Pistoia, editor, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PLAS 2008) (2008), pp. 135-146
-
(2008)
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PLAS
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
9
-
-
1642355346
-
-
Moskowitz, I.S., R.E. Newman, D.P. Crepeau and A.R. Miller, Covert channels and anonymizing networks., in: S. Jajodia, P. Samarati and P.F. Syverson, editors, WPES (2003), pp. 79-88
-
Moskowitz, I.S., R.E. Newman, D.P. Crepeau and A.R. Miller, Covert channels and anonymizing networks., in: S. Jajodia, P. Samarati and P.F. Syverson, editors, WPES (2003), pp. 79-88
-
-
-
-
10
-
-
2642560372
-
-
Moskowitz, I.S., R.E. Newman and P.F. Syverson, Quasi-anonymous channels, in: IASTED CNIS, 2003, pp. 126-131
-
Moskowitz, I.S., R.E. Newman and P.F. Syverson, Quasi-anonymous channels, in: IASTED CNIS, 2003, pp. 126-131
-
-
-
-
11
-
-
0002408684
-
On measures of entropy and information
-
Rény, A., On measures of entropy and information, in: Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, 1960, pp. 547-561
-
(1960)
Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability
, pp. 547-561
-
-
Rény, A.1
-
12
-
-
41549117992
-
Adversaries and information leaks (tutorial)
-
Proceedings of the Third Symposium on Trustworthy Global Computing. Barthe G., and Fournet C. (Eds)
-
Smith G. Adversaries and information leaks (tutorial). In: Barthe G., and Fournet C. (Eds). Proceedings of the Third Symposium on Trustworthy Global Computing. Lecture Notes in Computer Science 4912 (2007) 383-400
-
(2007)
Lecture Notes in Computer Science
, vol.4912
, pp. 383-400
-
-
Smith, G.1
-
13
-
-
41549167219
-
-
URL
-
URL. http://dx.doi.org/10.1007/978-3-540-78663-4_25
-
-
-
-
14
-
-
68549087948
-
On the foundations of quantitative information flow
-
Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. De Alfaro L. (Ed). (FOSSACS 2009)
-
Smith G. On the foundations of quantitative information flow. In: De Alfaro L. (Ed). Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. (FOSSACS 2009). Lecture Notes in Computer Science 5504 (2009) 288-302
-
(2009)
Lecture Notes in Computer Science
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
15
-
-
27944454436
-
Anonymity vs. information leakage in anonymity systems
-
Zhu, Y. and R. Bettati, Anonymity vs. information leakage in anonymity systems, in: Proc. of ICDCS (2005), pp. 514-524
-
(2005)
Proc. of ICDCS
, pp. 514-524
-
-
Zhu, Y.1
Bettati, R.2
|