-
1
-
-
77955177705
-
-
Technical report, LIX, Ecole Polytechnique
-
Miguel Andrés, Catuscia Palmidessi, Peter van Rossum, and Geoffrey Smith. Computing the amount of leakage in information-hiding systems. Technical report, LIX, Ecole Polytechnique, 2009.
-
(2009)
Computing the Amount of Leakage in Information-hiding Systems
-
-
Andrés, M.1
Palmidessi, C.2
Van Rossum, P.3
Smith, G.4
-
2
-
-
27244455746
-
Probabilistic anonymity
-
Martín Abadi and Luca de Alfaro, editors, Proceedings of CONCUR, Springer
-
Mohit Bhargava and Catuscia Palamidessi. Probabilistic anonymity. In Martín Abadi and Luca de Alfaro, editors, Proceedings of CONCUR, volume 3653 of Lecture Notes in Computer Science, pages 171-185. Springer, 2005. http://www. lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf.
-
(2005)
Lecture Notes in Computer Science
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
3
-
-
68549126859
-
-
Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009) Electronic Notes in Theoretical Computer Science Elsevier B.V.
-
Christelle Braun, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Quantitative notions of leakage for one-try attacks. In Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), volume 249 of Electronic Notes in Theoretical Computer Science, pages 75-91. Elsevier B.V., 2009.
-
(2009)
Quantitative notions of leakage for one-try attacks
, vol.249
, pp. 75-91
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
4
-
-
33750488738
-
Probable innocence revisited
-
Konstantinos Chatzikokolakis and Catuscia Palamidessi. Probable innocence revisited. Theoretical Computer Science, 367(1-2):123-138, 2006. http://www.lix.polytechnique. fr/~catuscia/papers/Anonymity/tcsPI.pdf.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 123-138
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
-
5
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels. Information and Computation, 206(2-4):378-401, 2008. http://www.lix.polytechnique.fr/~catuscia/papers/ Anonymity/Channels/full.pdf.
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
6
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels. Inf. Comput., 206(2-4):378-401, 2008.
-
(2008)
Inf. Comput.
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
7
-
-
54349091549
-
On the bayes risk in information-hiding protocols
-
Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. On the bayes risk in information-hiding protocols. Journal of Computer Security, 16(5):531-571, 2008.
-
(2008)
Journal of Computer Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
8
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
10
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation, Special Issue on Lambdacalculus, type theory and natural language, 18(2):181-199, 2005.
-
(2005)
Journal of Logic and Computation, Special Issue on Lambdacalculus, Type Theory and Natural Language
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
11
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative information flow, relations and polymorphic types. J. Log. Comput., 15(2): 181-199, 2005.
-
(2005)
J. Log. Comput.
, vol.15
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
12
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
13
-
-
0008144263
-
A distributed anonymous information storage and retrieval system
-
Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability Springer
-
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 44-66. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 44-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Theodore, W.4
Freenet, H.5
-
14
-
-
28144442041
-
Schneider. Belief in information flow
-
IEEE Computer Society
-
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider. Belief in information flow. In CSFW, pages 31-45. IEEE Computer Society, 2005.
-
(2005)
CSFW
, pp. 31-45
-
-
Clarkson, M.R.1
Myers, A.C.2
Fred, B.3
-
15
-
-
47249086747
-
Schneider. Quantifying information flow with beliefs
-
To appear. Available as Cornell Computer Science Department Technical Report TR
-
Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider. Quantifying information flow with beliefs. Journal of Computer Security, 2008. To appear. Available as Cornell Computer Science Department Technical Report TR 2007-207.
-
(2008)
Journal of Computer Security
, pp. 2007-2207
-
-
Clarkson, M.R.1
Myers, A.C.2
Fred, B.3
-
18
-
-
77955211734
-
-
Úlfar Erlingsson and Marco Pistoia, editors ACM
-
Úlfar Erlingsson and Marco Pistoia, editors. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PIAS 2008, Tucson, AZ, USA, June 8, 2008. ACM, 2008.
-
(2008)
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PIAS 2008, Tucson, AZ, USA, June 8, 2008
-
-
-
19
-
-
38149112556
-
Attacking unlinkability: The importance of context
-
Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, Springer
-
Matthias Franz, Bernd Meyer, and Andreas Pashalidis. Attacking unlinkability: The importance of context. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, volume 4776 of Lecture Notes in Computer Science, pages 1-16. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
, pp. 1-16
-
-
Franz, M.1
Meyer, B.2
Pashalidis, A.3
-
22
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Dominic Hughes and Vitaly Shmatikov. Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security, 12(1):3-36, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
24
-
-
34548282543
-
Assessing security threats of looping constructs
-
Martin Hofmann and Matthias Felleisen, editors, ACM
-
Pasquale Malacaria. Assessing security threats of looping constructs. In Martin Hofmann and Matthias Felleisen, editors, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2007, Nice, France, January 17-19, 2007, pages 225-235. ACM, 2007.
-
(2007)
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2007, Nice, France, January 17-19, 2007
, pp. 225-235
-
-
Malacaria, P.1
-
25
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Úlfar Erlingsson and Marco Pistoia, editor, Tucson, AZ, USA, June 8, 2008 ACM
-
Pasquale Malacaria and Han Chen. Lagrange multipliers and maximum information leakage in different observational models. In Úlfar Erlingsson and Marco Pistoia, editor, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PIAS 2008), pages 135-146, Tucson, AZ, USA, June 8, 2008 2008. ACM.
-
(2008)
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PIAS 2008)
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
28
-
-
1642355346
-
Covert channels and anonymizing networks
-
Sushil Jajodia, Pierangela Samarati, and Paul F. Syverson, editors, ACM
-
Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, and Allen R. Miller. Covert channels and anonymizing networks. In Sushil Jajodia, Pierangela Samarati, and Paul F. Syverson, editors, WPES, pages 79-88. ACM, 2003.
-
(2003)
WPES
, pp. 79-88
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
30
-
-
77955179501
-
-
Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors. ACM
-
Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors. Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM, 2007.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007
-
-
-
33
-
-
84949756689
-
CSP and anonymity
-
Proc. of the European Symposium on Research in Computer Security (ESORICS), Springer
-
Steve Schneider and Abraham Sidiropoulos. CSP and anonymity. In Proc. of the European Symposium on Research in Computer Security (ESORICS), volume 1146 of Lecture Notes in Computer Science, pages 198-218. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
34
-
-
41549117992
-
Adversaries and information leaks (tutorial)
-
Gilles Barthe and Cédric Fournet, editors, Proceedings of the Third Symposium on Trustworthy Global Computing, Springer
-
Geoffrey Smith. Adversaries and information leaks (tutorial). In Gilles Barthe and Cédric Fournet, editors, Proceedings of the Third Symposium on Trustworthy Global Computing, volume 4912 of Lecture Notes in Computer Science, pages 383-400. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4912
, pp. 383-400
-
-
Smith, G.1
-
35
-
-
68549087948
-
On the foundations of quantitative information flow
-
Luca De Alfaro, editor, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures (FOSSACS 2009), York, UK, March 2009 Springer
-
Geoffrey Smith. On the foundations of quantitative information flow. In Luca De Alfaro, editor, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures (FOSSACS 2009), volume 5504 of Lecture Notes in Computer Science, pages 288-302, York, UK, March 2009 2009. Springer.
-
(2009)
Lecture Notes in Computer Science
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
37
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California
-
P.F. Syverson, D.M. Goldschlag, and M.G. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44-54, Oakland, California, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
38
-
-
27944454436
-
Anonymity vs. information leakage in anonymity systems
-
IEEE Computer Society
-
Ye Zhu and Riccardo Bettati. Anonymity vs. information leakage in anonymity systems. In Proc. of ICDCS, pages 514-524. IEEE Computer Society, 2005.
-
(2005)
Proc. of ICDCS
, pp. 514-524
-
-
Zhu, Y.1
Bettati, R.2
|