-
2
-
-
33746371722
-
Quantifying information leakage in process calculi
-
Michele Boreale: Quantifying Information Leakage in Process Calculi. ICALP (2) 2006:119-131
-
(2006)
ICALP
, Issue.2
, pp. 119-131
-
-
Boreale, M.1
-
3
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
David Chaum: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1 (1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
4
-
-
77952350221
-
Anonymity protocols as noisy channels, in: Postproceedings of the symp
-
Springer
-
K. Chatzikokolakis, C. Palamidessi, P. Panangaden. Anonymity Protocols as Noisy Channels, in: Postproceedings of the Symp. on Trustworthy Global Computing, Lecture Notes in Computer Science, Springer, 2006.
-
(2006)
On Trustworthy Global Computing, Lecture Notes in Computer Science
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
7
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
Number 3
-
David Clark, Sebastian Hunt, Pasquale Malacaria: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, Volume 15, Number 3/2007.
-
(2007)
Journal of Computer Security
, vol.15
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
9
-
-
57849150065
-
Cyptography and data security
-
D. E. Denning: Cyptography and Data Security. Addison-Wesley, 1982.
-
(1982)
Addison-Wesley
-
-
Denning, D.E.1
-
10
-
-
38149040070
-
Two-sided statistical disclosure attack
-
LNCS 4476
-
George Danezis, Claudia Diaz and Carmela Troncoso. Two-Sided Statistical Disclosure Attack. In Proc. PET 2007, LNCS 4476, pp. 30-44, 2007.
-
(2007)
Proc. PET 2007
, pp. 30-44
-
-
Danezis, G.1
Diaz, C.2
Troncoso, C.3
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning: A lattice model of secure information flow. Communications of the ACM, 19 (5), May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
13
-
-
34748911762
-
A combinatorial approach to measuring anonymity
-
IEEE, 2007, pages
-
Matthew Edman, Fikret Sivrikaya, Bulent Yener. A Combinatorial Approach to Measuring Anonymity. In Proc. Intelligence and Security Informatics, 2007 IEEE, 2007, pages 356-363.
-
(2007)
Proc. Intelligence and Security Informatics
, pp. 356-363
-
-
Edman, M.1
Sivrikaya, F.2
Yener, B.3
-
15
-
-
38149112556
-
Attacking unlinkability: The importance of context
-
LNCS 4776
-
Matthias Franz, Bernd Meyer and Andreas Pashalidis, Attacking Unlinkability: The Importance of Context. In Proc. PET 2007, LNCS 4776, pp. 1-16, 2007.
-
(2007)
Proc. PET 2007
, pp. 1-16
-
-
Franz, M.1
Meyer, B.2
Pashalidis, A.3
-
16
-
-
0026157130
-
Toward a methematical foundataion for information flow security
-
Oakland, California, May
-
James W Gray III: Toward a methematical foundataion for information flow security. Proc. 1991 IEEE Symposium on Security and Privacy. Oakland, California, May 1991.
-
(1991)
Proc. 1991 IEEE Symposium on Security and Privacy
-
-
James Iii, W.G.1
-
17
-
-
1942500486
-
A quantitative analysis of anonymous communications
-
and, March
-
Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao: A quantitative analysis of anonymous communications. IEEE Transactions on Reliability, Page 103-115, Volume 53 (1), March 2004.
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.1
, pp. 103-115
-
-
Guan, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
18
-
-
39049114504
-
Information theory and statistics
-
S. Kullback: Information Theory and Statistics. Dover Publications. 1997.
-
(1997)
Dover Publications
-
-
Kullback, S.1
-
23
-
-
77049119724
-
Andreas pashalidis and bernd meyer linking anonymous transactions: The consistent view attack
-
Andreas Pashalidis and Bernd Meyer Linking Anonymous Transactions: The Consistent View Attack. In Proc. PET 2006, LNCS 4258, pp. 384-392, 2006.
-
(2006)
Proc. PET 2006, LNCS 4258
, pp. 384-392
-
-
-
29
-
-
77950856913
-
Probabilistic model checking of an anonymity system
-
Vitaly Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, vol 12, 2004.
-
(2004)
Journal of Computer Security
, vol.12
-
-
Shmatikov, V.1
|