-
1
-
-
0015287895
-
An algorithm for computing the capacity of arbitrary memoryless channels
-
Arimoto, S.: An algorithm for computing the capacity of arbitrary memoryless channels. IEEE Trans. on Inform. Theory IT-18(1), 14-20 (1972)
-
(1972)
IEEE Trans. on Inform. Theory
, vol.IT-18
, Issue.1
, pp. 14-20
-
-
Arimoto, S.1
-
2
-
-
57049126579
-
Formally bounding the side-channel leakage in unknown-message attacks
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008 Springer, Heidelberg
-
Backes, M., Köpf, B.: Formally bounding the side-channel leakage in unknown-message attacks. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 517-532. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 517-532
-
-
Backes, M.1
Köpf, B.2
-
3
-
-
0001185873
-
An essay towards solving a problem in the doctrine of chances
-
Bayes, T.: An essay towards solving a problem in the doctrine of chances. Philo. Trans. of the Royal Society of London 53, 370-418 (1774)
-
(1774)
Philo. Trans. of the Royal Society of London
, vol.53
, pp. 370-418
-
-
Bayes, T.1
-
5
-
-
0015376113
-
Computation of channel capacity and rate distortion functions
-
Blahut, R.E.: Computation of channel capacity and rate distortion functions. IEEE Trans. on Inform. Theory IT-18(4), 460-473 (1972)
-
(1972)
IEEE Trans. on Inform. Theory
, vol.IT-18
, Issue.4
, pp. 460-473
-
-
Blahut, R.E.1
-
8
-
-
77951536369
-
-
Technical report, University of Birmingham
-
Chatzikokolakis, K., Chothia, T., Guha, A.: Calculating probabilistic anonymity from sampled data. Technical report, University of Birmingham (2009)
-
(2009)
Calculating Probabilistic Anonymity from Sampled Data
-
-
Chatzikokolakis, K.1
Chothia, T.2
Guha, A.3
-
9
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation 206, 378-401 (2008)
-
(2008)
Information and Computation
, vol.206
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
10
-
-
54349091549
-
On the bayes risk in information-hiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the bayes risk in information-hiding protocols. J. Comput. Secur. 16(5), 531-571 (2008)
-
(2008)
J. Comput. Secur.
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
11
-
-
77951534380
-
Quantifying maximal loss of anonymity in protocols
-
Chen, H., Malacaria, P.: Quantifying maximal loss of anonymity in protocols. In: ASIACCS, pp. 206-217 (2009)
-
(2009)
ASIACCS
, pp. 206-217
-
-
Chen, H.1
Malacaria, P.2
-
12
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. J. Comput. Secur. 15(3), 321-371 (2007)
-
(2007)
J. Comput. Secur.
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
13
-
-
84954409133
-
Mixminion: Design of a type iii anonymous remailer protocol
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type iii anonymous remailer protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 2-15 (2003)
-
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, vol.2003
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
14
-
-
38049141694
-
Measuring anonymity with relative entropy
-
Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006 Springer, Heidelberg
-
Deng, Y., Pang, J., Wu, P.: Measuring anonymity with relative entropy. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 65-79. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4691
, pp. 65-79
-
-
Deng, Y.1
Pang, J.2
Wu, P.3
-
15
-
-
84957800033
-
Towards measuring anonymity
-
Dingledine, R., Syverson, P.F. (eds.) PET 2002 Springer, Heidelberg
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
16
-
-
5044242659
-
Blahut-arimoto algorithms for computing channel capacity and rate-distortion with side information
-
Dupuis, F., Yu, W., Willems, F.M.J.: Blahut-arimoto algorithms for computing channel capacity and rate-distortion with side information. In: Proceedings of International Symposium on Information Theory. ISIT 2004, p. 179+ (2004)
-
Proceedings of International Symposium on Information Theory. ISIT 2004
, vol.2004
, pp. 179
-
-
Dupuis, F.1
Yu, W.2
Willems, F.M.J.3
-
17
-
-
84899012896
-
Distribution of mutual information
-
MIT Press, Cambridge
-
Hutter, M.: Distribution of mutual information. In: Advances in Neural Information Processing Systems 14, pp. 399-406. MIT Press, Cambridge (2002)
-
(2002)
Advances in Neural Information Processing Systems
, vol.14
, pp. 399-406
-
-
Hutter, M.1
-
18
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
ACM, New York
-
Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: PLAS 2008: Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, pp. 135-146. ACM, New York (2008)
-
PLAS 2008: Proceedings of the Third ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
, vol.2008
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
19
-
-
67650675360
-
Information-theoretic modeling and analysis of interrupt-related covert channels
-
Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008 Springer, Heidelberg
-
Mantel, H., Sudbrock, H.: Information-theoretic modeling and analysis of interrupt-related covert channels. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 67-81. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5491
, pp. 67-81
-
-
Mantel, H.1
Sudbrock, H.2
-
20
-
-
19544388540
-
Information geometric formulation and interpretation of accelerated blahut-arimoto-type algorithms
-
2004 IEEE Information Theory Workshop - Proceedings, ITW
-
Matz, G., Duhamel, P.: Information geometric formulation and interpretation of accelerated blahut-arimoto-type algorithms. In: Proceedings of the IEEE Information Theory Workshop (ITW), pp. 66-70 (2004) (Pubitemid 40731298)
-
(2004)
2004 IEEE Information Theory Workshop - Proceedings, ITW
, pp. 66-70
-
-
Matz, G.1
Duhamel, P.2
-
23
-
-
0024621174
-
On estimation of entropy and mutual information of continuous distributions
-
Moddemejer, R.: On estimation of entropy and mutual information of continuous distributions. Signal Processing 16, 233-248 (1989)
-
(1989)
Signal Processing
, vol.16
, pp. 233-248
-
-
Moddemejer, R.1
-
24
-
-
2642560372
-
Quasi-anonymous channels
-
Moskowitz, I.S., Newman, R.E., Syverson, P.F.: Quasi-anonymous channels. In: IASTED CNIS, pp. 126-131 (2003)
-
(2003)
IASTED CNIS
, pp. 126-131
-
-
Moskowitz, I.S.1
Newman, R.E.2
Syverson, P.F.3
-
25
-
-
0041877169
-
Estimation of entropy and mutual information
-
Paninski, L.: Estimation of entropy and mutual information. Neural Comp. 15(6), 1191-1253 (2003)
-
(2003)
Neural Comp.
, vol.15
, Issue.6
, pp. 1191-1253
-
-
Paninski, L.1
-
26
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Dingledine, R., Syverson, P.F. (eds.) PET 2002 Springer, Heidelberg
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
29
-
-
27944454436
-
Anonymity vs. information leakage in anonymity systems
-
IEEE Computer Society, Los Alamitos
-
Zhu, Y., Bettati, R.: Anonymity vs. information leakage in anonymity systems. In: Proc. of ICDCS, pp. 514-524. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Proc. of ICDCS
, pp. 514-524
-
-
Zhu, Y.1
Bettati, R.2
|