-
1
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
DOI 10.1093/logcom/exi009, Lambda Calculus, Type Theory and Natural Language
-
D. Clark, S. Hunt, and P. Malacaria, "Quantitative information flow, relations and polymorphic types," Journal of Logic and Computation, vol. 18, no. 2, pp. 181-199, 2005. (Pubitemid 40860589)
-
(2005)
Journal of Logic and Computation
, vol.15
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
2
-
-
28144442041
-
Belief in information flow
-
M. Clarkson, A. Myers, and F. Schneider, "Belief in information flow," in Proc. 18th IEEE Computer Security Foundations Workshop (CSFW '05), 2005, pp. 31-45.
-
Proc. 18th IEEE Computer Security Foundations Workshop (CSFW '05), 2005
, pp. 31-45
-
-
Clarkson, M.1
Myers, A.2
Schneider, F.3
-
4
-
-
78449312369
-
Probabilistic information flow
-
M. Alvim, M. Andrés, and C. Palamidessi, "Probabilistic information flow," in Proc. 25th IEEE Symposium on Logic in Computer Science (LICS 2010), 2010, pp. 314-321.
-
Proc. 25th IEEE Symposium on Logic in Computer Science (LICS 2010), 2010
, pp. 314-321
-
-
Alvim, M.1
Andrés, M.2
Palamidessi, C.3
-
5
-
-
77955207171
-
Reconciling belief and vulnerability in information flow
-
S. Hamadou, V. Sassone, and C. Palamidessi, "Reconciling belief and vulnerability in information flow," in Proc. 31st IEEE Symposium on Security and Privacy, 2010, pp. 79-92.
-
Proc. 31st IEEE Symposium on Security and Privacy, 2010
, pp. 79-92
-
-
Hamadou, S.1
Sassone, V.2
Palamidessi, C.3
-
6
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, "A mathematical theory of communication,"Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
-
-
Shannon, C.E.1
-
8
-
-
70450252184
-
Measuring channel capacity to distinguish undue influence
-
J. Newsome, S. McCamant, and D. Song, "Measuring channel capacity to distinguish undue influence," in Proc. Fourth Workshop on Programming Languages and Analysis for Security (PLAS '09), 2009, pp. 73-85.
-
Proc. Fourth Workshop on Programming Languages and Analysis for Security (PLAS '09), 2009
, pp. 73-85
-
-
Newsome, J.1
McCamant, S.2
Song, D.3
-
10
-
-
0002688297
-
The bandwagon
-
C. E. Shannon, "The bandwagon," IRE Transactions on Information Theory, vol. 2, no. 1, p. 3, 1956.
-
(1956)
IRE Transactions on Information Theory
, vol.2
, Issue.1
, pp. 3
-
-
Shannon, C.E.1
-
17
-
-
40149107259
-
Anonymity protocols as noisy channels
-
K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, "Anonymity protocols as noisy channels," Information and Computation, vol. 206, pp. 378-401, 2008.
-
(2008)
Information and Computation
, vol.206
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
19
-
-
68549087948
-
On the foundations of quantitative information flow
-
Proc. 12th International Conference on Foundations of Software Science and Computational Structures (FoSSaCS '09), ser. L. de Alfaro, Ed.
-
G. Smith, "On the foundations of quantitative information flow," in Proc. 12th International Conference on Foundations of Software Science and Computational Structures (FoSSaCS '09), ser. Lecture Notes in Computer Science, L. de Alfaro, Ed., vol. 5504, 2009, pp. 288-302.
-
(2009)
Lecture Notes in Computer Science
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
20
-
-
54349091549
-
On the Bayes risk in information-hiding protocols
-
K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, "On the Bayes risk in information-hiding protocols," Journal of Computer Security, vol. 16, no. 5, pp. 531-571, 2008.
-
(2008)
Journal of Computer Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
22
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal of Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal of Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
23
-
-
68549126859
-
Quantitative notions of leakage for one-try attacks
-
Proc. 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), ser.
-
C. Braun, K. Chatzikokolakis, and C. Palamidessi, "Quantitative notions of leakage for one-try attacks," in Proc. 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), ser. ENTCS, vol. 249, 2009, pp. 75-91.
-
(2009)
ENTCS
, vol.249
, pp. 75-91
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
25
-
-
62749202080
-
On an improvement over Rényi's equivocation bound
-
N. Santhi and A. Vardy, "On an improvement over Rényi's equivocation bound," in 44th Annual Allerton Conference on Communication, Control, and Computing, 2006.
-
44th Annual Allerton Conference on Communication, Control, and Computing, 2006
-
-
Santhi, N.1
Vardy, A.2
-
26
-
-
54049084647
-
A monotonicity principle for information theory
-
Proc. 24th Conference on the Mathematical Foundations of Programming Semantics, ser.
-
K. Chatzikokolakis and K. Martin, "A monotonicity principle for information theory." in Proc. 24th Conference on the Mathematical Foundations of Programming Semantics, ser. Electronic Notes in Theoretical Computer Science, vol. 218, 2008, pp. 111-129.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.218
, pp. 111-129
-
-
Chatzikokolakis, K.1
Martin, K.2
-
28
-
-
79960012182
-
-
LIX, Ecole Polytechnique, Tech. Rep.
-
M. Alvim, M. Andrés, K. Chatzikokolakis, P. Degano, and C. Palamidessi, "Differential privacy: on the trade-off between utility and information leakage," LIX, Ecole Polytechnique, Tech. Rep., 2011.
-
(2011)
Differential Privacy: On the Trade-off between Utility and Information Leakage
-
-
Alvim, M.1
Andrés, M.2
Chatzikokolakis, K.3
Degano, P.4
Palamidessi, C.5
-
30
-
-
78650804208
-
A firm foundation for private data analysis
-
C. Dwork, "A firm foundation for private data analysis, "Communications of the ACM, vol. 54, no. 1, 2011.
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
-
-
Dwork, C.1
-
32
-
-
77951595720
-
Computing the leakage of information-hiding systems
-
Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. J. Esparza and R. Majumdar, Eds.
-
M. Andrés, C. Palamidessi, P. van Rossum, and G. Smith, "Computing the leakage of information-hiding systems," in Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. Lecture Notes in Computer Science, J. Esparza and R. Majumdar, Eds., vol. 6015, 2010, pp. 373-389.
-
(2010)
Lecture Notes in Computer Science
, vol.6015
, pp. 373-389
-
-
Andrés, M.1
Palamidessi, C.2
Van Rossum, P.3
Smith, G.4
-
33
-
-
77951581039
-
Statistical measurement of information leakage
-
Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. J. Esparza and R. Majumdar, Eds.
-
K. Chatzikokolakis, T. Chothia, and A. Guha, "Statistical measurement of information leakage," in Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. Lecture Notes in Computer Science, J. Esparza and R. Majumdar, Eds., vol. 6015, 2010, pp. 390-404.
-
(2010)
Lecture Notes in Computer Science
, vol.6015
, pp. 390-404
-
-
Chatzikokolakis, K.1
Chothia, T.2
Guha, A.3
|