-
3
-
-
80054881362
-
The reactive simulatability framework for asynchronous systems
-
preprint on IACR ePrint 2004/082
-
Backes, M., B. Pfitzmann and M. Waidner, The reactive simulatability framework for asynchronous systems, Information and Computation (2007), preprint on IACR ePrint 2004/082.
-
Information and Computation (2007)
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
0034140755
-
Deciding bisimilarity and similarity for probabilistic processes
-
DOI 10.1006/jcss.1999.1683
-
C. Baier, B. Engelen, and M. Majster-Cederbaum Deciding bisimilarity and similarity for probabilistic processes Journal of Computer and System Sciences 60 2000 187 231 (Pubitemid 30568401)
-
(2000)
Journal of Computer and System Sciences
, vol.60
, Issue.1
, pp. 187-231
-
-
Baier, C.1
Engelen, B.2
Majster-Cederbaum, M.3
-
7
-
-
35248852380
-
Bisimulation and unwinding for verifying possibilistic security properties
-
Bossi, A., R. Focardi, C. Piazza and S. Rossi, Bisimulation and unwinding for verifying possibilistic security properties, in: VMCAI 2003: Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation (2003), pp. 223-237.
-
(2003)
VMCAI 2003: Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
, pp. 223-237
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
8
-
-
39549105169
-
Time-bounded task-pioas: A framework for analyzing security protocols
-
short version appeared In 20th Symposium on Distributed Computing (DISC), 2006
-
R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala Time-bounded task-pioas: A framework for analyzing security protocols Journal of Discrete Event Dynamic Systems 18 2008 111 159 short version appeared In 20th Symposium on Distributed Computing (DISC), 2006
-
(2008)
Journal of Discrete Event Dynamic Systems
, vol.18
, pp. 111-159
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
9
-
-
84874725869
-
Decision algorithms for probabilistic bisimulation
-
L. Brim, P. Jancar, M. Kretínský, A. Kucera, LNCS
-
S. Cattani, and R. Segala Decision algorithms for probabilistic bisimulation L. Brim, P. Jancar, M. Kretínský, A. Kucera, CONCUR 02: Proceedings of the 13th International Conference on Concurrency Theory LNCS vol. 2421 2002 371 385 URL citeseer.ist.psu.edu/cattani02decision.html
-
(2002)
CONCUR 02: Proceedings of the 13th International Conference on Concurrency Theory
, vol.2421
, pp. 371-385
-
-
Cattani, S.1
Segala, R.2
-
11
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria A static analysis for quantifying information flow in a simple imperative language Journal of Computer Security 15 2007 321 371 (Pubitemid 46868450)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
13
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
Dwork, C., Differential privacy, in: 33rd International Colloquium on Automata, Languages and Programming (ICALP 2006), 2006, pp. 1-12, part 2. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
15
-
-
70350645515
-
The differential privacy frontier (extended abstract)
-
Lecture Notes in Computer Science
-
C. Dwork The differential privacy frontier (extended abstract) 6th Theory of Cryptography Conference Lecture Notes in Computer Science vol. 5444 2009 496 502
-
(2009)
6th Theory of Cryptography Conference
, vol.5444
, pp. 496-502
-
-
Dwork, C.1
-
17
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith Calibrating noise to sensitivity in private data analysis Theory of Cryptography Conference Lecture Notes in Computer Science vol. 3876 2006 265 284 (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
18
-
-
77954717626
-
Differential privacy under continual observation
-
Dwork, C., M. Naor, T. Pitassi and G. N. Rothblum, Differential privacy under continual observation, in: In Proceedings of the 42nd ACM Syposium on the Theory of Computing (STOC), 2010.
-
(2010)
Proceedings of the 42nd ACM Syposium on the Theory of Computing (STOC)
-
-
Dwork, C.1
Naor, M.2
Pitassi, G.N.3
Rothblum, T.4
-
23
-
-
0026157130
-
Toward a mathematical foundation for information flow security
-
Gray, J. W., III, Toward a mathematical foundation for information flow security, in: IEEE Symposium on Security and Privacy, 1991, pp. 21-35.
-
(1991)
IEEE Symposium on Security and Privacy
, pp. 21-35
-
-
Gray Iii, J.W.1
-
24
-
-
84974759639
-
Toward a mathematical foundation for information
-
J.W. Gray Toward a mathematical foundation for information Journal of Computer Security 1 1992 255 294
-
(1992)
Journal of Computer Security
, vol.1
, pp. 255-294
-
-
Gray, J.W.1
-
25
-
-
39549117389
-
Observing branching structure through probabilistic contexts
-
N. Lynch, R. Segala, and F. Vaandrager Observing branching structure through probabilistic contexts SIAM Journal on Computing 37 2007 977 1013
-
(2007)
SIAM Journal on Computing
, vol.37
, pp. 977-1013
-
-
Lynch, N.1
Segala, R.2
Vaandrager, F.3
-
26
-
-
0005336501
-
Forward and backward simulations Part I: Untimed systems
-
N. Lynch, and F. Vaandrager Forward and backward simulations Part I: Untimed systems Inf. Comput. 121 1995 214 233
-
(1995)
Inf. Comput.
, vol.121
, pp. 214-233
-
-
Lynch, N.1
Vaandrager, F.2
-
32
-
-
79959918604
-
Computational differential privacy
-
Mironov, I., O. Pandey, O. Reingold and S. Vadhan, Computational differential privacy, in: Advances in Cryptology - CRYPTO 2009, 2009.
-
(2009)
Advances in Cryptology - CRYPTO 2009
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.4
-
33
-
-
57349154464
-
Influence: A quantitative approach for data integrity
-
CyLab, Carnegie Mellon University
-
Newsome, J. and D. Song, Influence: A quantitative approach for data integrity, Technical Report CMU-CyLab-08-005, CyLab, Carnegie Mellon University (2008).
-
(2008)
Technical Report CMU-CyLab-08-005
-
-
Newsome, J.1
Song, D.2
-
34
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
DOI 10.1145/1250790.1250803, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
Nissim, K., S. Raskhodnikova and A. Smith, Smooth sensitivity and sampling in private data analysis, in: STOC 07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing (2007), pp. 75-84. (Pubitemid 47630723)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
37
-
-
77952356233
-
Differential privacy for collaborative security
-
Reed, J., A. J. Aviv, D. Wagner, A. Haeberlen, B. C. Pierce and J. M. Smith, Differential privacy for collaborative security, in: European Workshop on System Security (EUROSEC), 2010.
-
(2010)
European Workshop on System Security (EUROSEC)
-
-
Reed, J.1
Aviv, A.J.2
Wagner, D.3
Haeberlen, A.4
Pierce, B.C.5
Smith, J.M.6
-
39
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
Roy, I., H. E. Ramadan, S. T. Setty, A. Kilzer, V. Shmatikov and E. Witchel, Airavat: Security and privacy for MapReduce, in: Proceedings of the 7th Usenix Symposium on Networked Systems Design and Implementation (NSDI), 2010.
-
(2010)
Proceedings of the 7th Usenix Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Roy, I.1
Ramadan, H.E.2
Setty, S.T.3
Kilzer, A.4
Shmatikov, V.5
Witchel, E.6
-
41
-
-
0001609136
-
Probabilistic simulations for probabilistic processes
-
R. Segala, and N. Lynch Probabilistic simulations for probabilistic processes Nordic Journal of Computing 2 1995
-
(1995)
Nordic Journal of Computing
, vol.2
-
-
Segala, R.1
Lynch, N.2
-
42
-
-
35048868422
-
Approximated computationally bounded simulation relations for probabilistic automata
-
Venice, Italy
-
Segala, R. and A. Turrini, Approximated computationally bounded simulation relations for probabilistic automata, in: Proceedings of the 20th IEEE Computer Security Foundations Symposium, Venice, Italy, 2007, pp. 140-156.
-
(2007)
Proceedings of the 20th IEEE Computer Security Foundations Symposium
, pp. 140-156
-
-
Segala, R.1
Turrini, A.2
-
43
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
Pacific Grove, California
-
Smith, G., Probabilistic noninterference through weak probabilistic bisimulation, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, Pacific Grove, California, 2003, pp. 3-13.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop
, pp. 3-13
-
-
Smith, G.1
|