-
1
-
-
27244455746
-
Probabilistic anonymity
-
Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. Springer, Heidelberg
-
Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 171-185. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
2
-
-
47249145678
-
Compositional methods for information-hiding
-
Amadio, R.M. (ed.) FOSSACS 2008. Springer, Heidelberg
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional methods for information-hiding. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4962
, pp. 443-457
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
4
-
-
35048859323
-
Probability of error in information-hiding protocols
-
IEEE Computer Society, Los Alamitos
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in information-hiding protocols. In: CSF, pp. 341-354. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
CSF
, pp. 341-354
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
5
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Inf. Comput. 206(2-4), 378-401 (2008)
-
(2008)
Inf. Comput.
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
6
-
-
54349091549
-
On the Bayes risk in information-hiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the Bayes risk in information-hiding protocols. Journal of Computer Security 16(5), 531-571 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
8
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15(3), 321-371 (2007) (Pubitemid 46868450)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
9
-
-
28144442041
-
Belief in information flow
-
IEEE Computer Society, Los Alamitos
-
Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. In: CSFW, pp. 31-45. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
CSFW
, pp. 31-45
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
10
-
-
38049141694
-
Measuring anonymity with relative entropy
-
Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
-
Deng, Y., Pang, J., Wu, P.: Measuring anonymity with relative entropy. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 65-79. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4691
, pp. 65-79
-
-
Deng, Y.1
Pang, J.2
Wu, P.3
-
11
-
-
38149112556
-
Attacking unlinkability: The importance of context
-
Borisov, N., Golle, P. (eds.) PET 2007. Springer, Heidelberg
-
Franz, M., Meyer, B., Pashalidis, A.: Attacking unlinkability: The importance of context. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4776
, pp. 1-16
-
-
Franz, M.1
Meyer, B.2
Pashalidis, A.3
-
12
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3), 483-512 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
13
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3), 483-512 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
14
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM, New York
-
Köpf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 286-296. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 286-296
-
-
Köpf, B.1
Basin, D.A.2
-
15
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Erlingsson, Ú., Pistoia, M. (eds.) ACM, New York
-
Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: Erlingsson, Ú., Pistoia, M. (eds.) PLAS, pp. 135-146. ACM, New York (2008)
-
(2008)
PLAS
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
17
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Dingledine, R., Syverson, P.F. (eds.) PET 2002. Springer, Heidelberg
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
18
-
-
84885205648
-
Measuring relationship anonymity in mix networks
-
Juels, A., Winslett, M. (eds.) ACM, New York
-
Shmatikov, V., Wang, M.-H.: Measuring relationship anonymity in mix networks. In: Juels, A., Winslett, M. (eds.) WPES, pp. 59-62. ACM, New York (2006)
-
(2006)
WPES
, pp. 59-62
-
-
Shmatikov, V.1
Wang, M.-H.2
-
19
-
-
68549087948
-
On the foundations of quantitative information flow
-
de Alfaro, L. (ed.) FOSSACS 2009. Springer, Heidelberg
-
Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5504
, pp. 288-302
-
-
Smith, G.1
|