메뉴 건너뛰기




Volumn 6199 LNCS, Issue PART 2, 2010, Pages 223-235

Compositional closure for bayes risk in probabilistic noninterference

Author keywords

[No Author keywords available]

Indexed keywords

BAYES RISK; COMPOSITIONALITY; PROBABILISTIC NONINTERFERENCE; SEQUENTIAL MODEL;

EID: 77955318658     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14162-1_19     Document Type: Conference Paper
Times cited : (59)

References (20)
  • 1
    • 47249145678 scopus 로고    scopus 로고
    • Compositional methods for information-hiding
    • Amadio, R. M. ed., vol, Springer, Heidelberg
    • Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional methods for information-hiding. In: Amadio, R. M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
    • (2008) FOSSACS 2008. LNCS , vol.4962 , pp. 443-457
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 2
    • 68549126859 scopus 로고    scopus 로고
    • Quantitative notions of leakage for one-try attacks
    • Elsevier, Amsterdam
    • Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proc. MFPS. ENTCS, vol. 249, Elsevier, Amsterdam (2009)
    • (2009) Proc. MFPS. ENTCS , vol.249
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 3
    • 35048859323 scopus 로고    scopus 로고
    • Probability of error in information-hiding protocols
    • IEEE, Los Alamitos
    • Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in information-hiding protocols. In: Proc. CSF, pp. 341-354. IEEE, Los Alamitos (2007)
    • (2007) Proc. CSF , pp. 341-354
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 4
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D.: The Dining Cryptographers problem: Unconditional sender and recipient untraceability. Jnl. Cryptol. 1 (1), 65-75 (1988)
    • (1988) Jnl. Cryptol , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 6
    • 77955322618 scopus 로고    scopus 로고
    • Probabilistic Systems Group
    • Probabilistic Systems Group, http://www.cse.unsw.edu.au/~carrollm/probs
  • 8
    • 0020732231 scopus 로고
    • A probabilistic PDL
    • Kozen, D.: A probabilistic PDL. Jnl. Comp. Sys. Sci. 30 (2), 162-178 (1985)
    • (1985) Jnl. Comp. Sys. Sci. , vol.30 , Issue.2 , pp. 162-178
    • Kozen, D.1
  • 10
    • 77955314777 scopus 로고    scopus 로고
    • Draft of this paper including its appendices [6, McIver:10]
    • McIver, A. K., Meinicke, L. A., Morgan, C. C.: Draft of this paper including its appendices [6, McIver:10]
    • McIver, A.K.1    Meinicke, L.A.2    Morgan, C.C.3
  • 11
    • 77955334748 scopus 로고    scopus 로고
    • Draft full version of this paper
    • McIver, A. K., Meinicke, L. A., Morgan, C. C.: Draft full version of this paper, http://www.comp.mq.edu.au/~lmeinick/icalp.pdf
    • McIver, A.K.1    Meinicke, L.A.2    Morgan, C.C.3
  • 12
    • 22144496087 scopus 로고    scopus 로고
    • Abstraction, refinement and proof for probabilistic systems
    • Springer, Heidelberg
    • McIver, A. K., Morgan, C. C.: Abstraction, Refinement and Proof for Probabilistic Systems. Tech. Mono. Computer Science. Springer, Heidelberg (2005)
    • (2005) Tech. Mono. Computer Science
    • McIver, A.K.1    Morgan, C.C.2
  • 13
    • 70649085848 scopus 로고    scopus 로고
    • Sums and lovers: Case studies in security, compositionality and refinement
    • Cavalcanti, A., Dams, D. eds., Springer, Heidelberg, Treats Two-Party Secure Computation
    • McIver, A. K., Morgan, C. C.: Sums and lovers: Case studies in security, compositionality and refinement. In: Cavalcanti, A., Dams, D. (eds.) Proc. FM 2009. LNCS, vol. 5850, Springer, Heidelberg (2009), Treats Two-Party Secure Computation
    • (2009) Proc. FM 2009. LNCS , vol.5850
    • McIver, A.K.1    Morgan, C.C.2
  • 14
    • 67349149975 scopus 로고    scopus 로고
    • The shadow knows: Refinement of ignorance in sequential programs
    • Treats Oblivious Transfer
    • Morgan, C. C.: The Shadow Knows: Refinement of ignorance in sequential programs. Science of Computer Programming 74 (8) (2009), Treats Oblivious Transfer
    • (2009) Science of Computer Programming , vol.74 , Issue.8
    • Morgan, C.C.1
  • 15
    • 84947756322 scopus 로고    scopus 로고
    • On the incomparability of entropy and marginal guesswork in bruteforce attacks
    • Roy, B., Okamoto, E. eds., vol, Springer, Heidelberg
    • Pliam, J. O.: On the incomparability of entropy and marginal guesswork in bruteforce attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000)
    • (2000) INDOCRYPT 2000. LNCS , vol.1977 , pp. 67-79
    • Pliam, J.O.1
  • 16
    • 0041965552 scopus 로고    scopus 로고
    • Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser
    • Rivest, R.: Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser. Technical report, M. I. T. (1999), http://theory.lcs.mit.edu/~rivest/Rivest-commitment.pdf
    • (1999) Technical Report, M. I. T
    • Rivest, R.1
  • 17
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C. E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656 (1948)
    • (1948) Bell System Technical Journal , vol.27 , Issue.379-423 , pp. 623-656
    • Shannon, C.E.1
  • 18
    • 41549117992 scopus 로고    scopus 로고
    • Adversaries and information leaks
    • Barthe, G., Fournet, C. eds., vol, Springer, Heidelberg
    • Smith, G.: Adversaries and information leaks. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 383-400. Springer, Heidelberg (2008)
    • (2008) TGC 2007 and FODO 2008. LNCS , vol.4912 , pp. 383-400
    • Smith, G.1
  • 19
    • 77955337730 scopus 로고
    • Linear programming
    • Routledge and Kegan Paul, London
    • Trustrum, K.: Linear Programming. Library of Mathematics. Routledge and Kegan Paul, London (1971)
    • (1971) Library of Mathematics
    • Trustrum, K.1
  • 20
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • IEEE, Los Alamitos
    • Yao, A. C.: Protocols for secure computations (extended abstract). In: Proc. FOCS 1982, pp. 160-164. IEEE, Los Alamitos (1982)
    • (1982) Proc. FOCS 1982 , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.