메뉴 건너뛰기




Volumn 6879 LNCS, Issue , 2011, Pages 588-606

Quantitative information flow, with a view

Author keywords

anonymity; information theory; privacy; quantitative information flow; statistical attacks

Indexed keywords

ANONYMITY; GENERAL MODEL; INFORMATION HIDING SYSTEMS; NOISY CHANNEL; PASSIVE EAVESDROPPERS; PRIVACY; PROPERTY; QUANTITATIVE INFORMATION FLOWS; STATISTICAL ATTACKS; SYSTEM SECURITY;

EID: 80053013946     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23822-2_32     Document Type: Conference Paper
Times cited : (18)

References (22)
  • 1
    • 57049126579 scopus 로고    scopus 로고
    • Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Backes, M., Köpf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 517-532. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 517-532
    • Backes, M.1    Köpf, B.2
  • 2
    • 54249100086 scopus 로고    scopus 로고
    • The Complexity of Distinguishing Distributions (Invited Talk)
    • Safavi-Naini, R. (ed.) ICITS 2008. Springer, Heidelberg
    • Baignères, T., Vaudenay, S.: The Complexity of Distinguishing Distributions (Invited Talk). In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 210-222. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5155 , pp. 210-222
    • Baignères, T.1    Vaudenay, S.2
  • 3
    • 78649453243 scopus 로고    scopus 로고
    • Quantifying Opacity
    • IEEE Society, Los Alamitos
    • Bérard, B., Mullins, J., Sassolas, M.: Quantifying Opacity. In: Proc. of QEST 2010, pp. 263-272. IEEE Society, Los Alamitos (2010)
    • (2010) Proc. of QEST 2010 , pp. 263-272
    • Bérard, B.1    Mullins, J.2    Sassolas, M.3
  • 4
    • 67349145950 scopus 로고    scopus 로고
    • Quantifying information leakage in process calculi
    • Boreale, M.: Quantifying information leakage in process calculi. Information and Computation 207(6), 699-725 (2009)
    • (2009) Information and Computation , vol.207 , Issue.6 , pp. 699-725
    • Boreale, M.1
  • 5
    • 79953166100 scopus 로고    scopus 로고
    • Asymptotic information leakage under one-try attacks
    • Hofmann, M. (ed.) FOSSACS 2011. Springer, Heidelberg
    • Boreale, M., Pampaloni, F., Paolini, M.: Asymptotic information leakage under one-try attacks. In: Hofmann, M. (ed.) FOSSACS 2011. LNCS, vol. 6604, pp. 396-410. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6604 , pp. 396-410
    • Boreale, M.1    Pampaloni, F.2    Paolini, M.3
  • 6
    • 47249145678 scopus 로고    scopus 로고
    • Compositional Methods for Information-Hiding
    • Amadio, R.M. (ed.) FOSSACS 2008. Springer, Heidelberg
    • Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional Methods for Information-Hiding. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4962 , pp. 443-457
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return address, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM 24(2) (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.1
  • 14
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 16
    • 70350561721 scopus 로고    scopus 로고
    • A Provably Secure and Efficient Countermeasure against Timing Attacks
    • Köpf, B., Dürmuth, M.: A Provably Secure and Efficient Countermeasure against Timing Attacks. In: CSF 2009, pp. 324-335 (2009)
    • (2009) CSF 2009 , pp. 324-335
    • Köpf, B.1    Dürmuth, M.2
  • 17
    • 77957606219 scopus 로고    scopus 로고
    • Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
    • Köpf, B., Smith, G.: Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. In: CSF 2010, pp. 44-56 (2010)
    • (2010) CSF 2010 , pp. 44-56
    • Köpf, B.1    Smith, G.2
  • 19
    • 50249142450 scopus 로고    scopus 로고
    • Robust De-anonymization of Large Sparse Datasets
    • IEEE Computer Society, Los Alamitos
    • Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: IEEE Symposium on Security and Privacy 2008, pp. 111-125. IEEE Computer Society, Los Alamitos (2008)
    • (2008) IEEE Symposium on Security and Privacy 2008 , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 20
    • 85165841617 scopus 로고    scopus 로고
    • Personal communication
    • Shmatikov, V.: Personal communication (2011)
    • (2011)
    • Shmatikov, V.1
  • 21
    • 68549087948 scopus 로고    scopus 로고
    • On the Foundations of Quantitative Information Flow
    • de Alfaro, L. (ed.) FOSSACS 2009. Springer, Heidelberg
    • Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5504 , pp. 288-302
    • Smith, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.