-
1
-
-
47249145678
-
Compositional methods for information-hiding
-
Amadio, R. M. ed., vol, Springer, Heidelberg
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional methods for information-hiding. In: Amadio, R. M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
-
(2008)
FOSSACS 2008. LNCS
, vol.4962
, pp. 443-457
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
2
-
-
68549126859
-
Quantitative notions of leakage for one-try attacks
-
Elsevier, Amsterdam
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proc. MFPS. ENTCS, vol. 249, Elsevier, Amsterdam (2009)
-
(2009)
Proc. MFPS. ENTCS
, vol.249
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
3
-
-
35048859323
-
Probability of error in information-hiding protocols
-
IEEE, Los Alamitos
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in information-hiding protocols. In: Proc. CSF, pp. 341-354. IEEE, Los Alamitos (2007)
-
(2007)
Proc. CSF
, pp. 341-354
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The Dining Cryptographers problem: Unconditional sender and recipient untraceability. Jnl. Cryptol. 1 (1), 65-75 (1988)
-
(1988)
Jnl. Cryptol
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
77955322618
-
-
Probabilistic Systems Group
-
Probabilistic Systems Group, http://www.cse.unsw.edu.au/~carrollm/probs
-
-
-
-
8
-
-
0020732231
-
A probabilistic PDL
-
Kozen, D.: A probabilistic PDL. Jnl. Comp. Sys. Sci. 30 (2), 162-178 (1985)
-
(1985)
Jnl. Comp. Sys. Sci.
, vol.30
, Issue.2
, pp. 162-178
-
-
Kozen, D.1
-
10
-
-
77955314777
-
-
Draft of this paper including its appendices [6, McIver:10]
-
McIver, A. K., Meinicke, L. A., Morgan, C. C.: Draft of this paper including its appendices [6, McIver:10]
-
-
-
McIver, A.K.1
Meinicke, L.A.2
Morgan, C.C.3
-
11
-
-
77955334748
-
-
Draft full version of this paper
-
McIver, A. K., Meinicke, L. A., Morgan, C. C.: Draft full version of this paper, http://www.comp.mq.edu.au/~lmeinick/icalp.pdf
-
-
-
McIver, A.K.1
Meinicke, L.A.2
Morgan, C.C.3
-
12
-
-
22144496087
-
Abstraction, refinement and proof for probabilistic systems
-
Springer, Heidelberg
-
McIver, A. K., Morgan, C. C.: Abstraction, Refinement and Proof for Probabilistic Systems. Tech. Mono. Computer Science. Springer, Heidelberg (2005)
-
(2005)
Tech. Mono. Computer Science
-
-
McIver, A.K.1
Morgan, C.C.2
-
13
-
-
70649085848
-
Sums and lovers: Case studies in security, compositionality and refinement
-
Cavalcanti, A., Dams, D. eds., Springer, Heidelberg, Treats Two-Party Secure Computation
-
McIver, A. K., Morgan, C. C.: Sums and lovers: Case studies in security, compositionality and refinement. In: Cavalcanti, A., Dams, D. (eds.) Proc. FM 2009. LNCS, vol. 5850, Springer, Heidelberg (2009), Treats Two-Party Secure Computation
-
(2009)
Proc. FM 2009. LNCS
, vol.5850
-
-
McIver, A.K.1
Morgan, C.C.2
-
14
-
-
67349149975
-
The shadow knows: Refinement of ignorance in sequential programs
-
Treats Oblivious Transfer
-
Morgan, C. C.: The Shadow Knows: Refinement of ignorance in sequential programs. Science of Computer Programming 74 (8) (2009), Treats Oblivious Transfer
-
(2009)
Science of Computer Programming
, vol.74
, Issue.8
-
-
Morgan, C.C.1
-
15
-
-
84947756322
-
On the incomparability of entropy and marginal guesswork in bruteforce attacks
-
Roy, B., Okamoto, E. eds., vol, Springer, Heidelberg
-
Pliam, J. O.: On the incomparability of entropy and marginal guesswork in bruteforce attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000)
-
(2000)
INDOCRYPT 2000. LNCS
, vol.1977
, pp. 67-79
-
-
Pliam, J.O.1
-
16
-
-
0041965552
-
Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser
-
Rivest, R.: Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser. Technical report, M. I. T. (1999), http://theory.lcs.mit.edu/~rivest/Rivest-commitment.pdf
-
(1999)
Technical Report, M. I. T
-
-
Rivest, R.1
-
17
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C. E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656 (1948)
-
(1948)
Bell System Technical Journal
, vol.27
, Issue.379-423
, pp. 623-656
-
-
Shannon, C.E.1
-
18
-
-
41549117992
-
Adversaries and information leaks
-
Barthe, G., Fournet, C. eds., vol, Springer, Heidelberg
-
Smith, G.: Adversaries and information leaks. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 383-400. Springer, Heidelberg (2008)
-
(2008)
TGC 2007 and FODO 2008. LNCS
, vol.4912
, pp. 383-400
-
-
Smith, G.1
-
19
-
-
77955337730
-
Linear programming
-
Routledge and Kegan Paul, London
-
Trustrum, K.: Linear Programming. Library of Mathematics. Routledge and Kegan Paul, London (1971)
-
(1971)
Library of Mathematics
-
-
Trustrum, K.1
-
20
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
IEEE, Los Alamitos
-
Yao, A. C.: Protocols for secure computations (extended abstract). In: Proc. FOCS 1982, pp. 160-164. IEEE, Los Alamitos (1982)
-
(1982)
Proc. FOCS 1982
, pp. 160-164
-
-
Yao, A.C.1
|