메뉴 건너뛰기




Volumn , Issue , 2011, Pages 159-167

Quantifying information flow using min-entropy

Author keywords

[No Author keywords available]

Indexed keywords

BAYES RISK; CONFIDENTIAL INFORMATION; INFORMATION FLOWS; MIN-ENTROPY; MUTUAL INFORMATIONS; PRACTICAL SYSTEMS; PROBABILISTIC SYSTEMS; QUANTITATIVE THEORY; SHANNON ENTROPY;

EID: 80055063879     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/QEST.2011.31     Document Type: Conference Paper
Times cited : (62)

References (36)
  • 1
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • DOI 10.1093/logcom/exi009, Lambda Calculus, Type Theory and Natural Language
    • D. Clark, S. Hunt, and P. Malacaria, "Quantitative information flow, relations and polymorphic types," Journal of Logic and Computation, vol. 18, no. 2, pp. 181-199, 2005. (Pubitemid 40860589)
    • (2005) Journal of Logic and Computation , vol.15 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 6
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, "A mathematical theory of communication,"Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, 1948.
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.E.1
  • 19
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • Proc. 12th International Conference on Foundations of Software Science and Computational Structures (FoSSaCS '09), ser. L. de Alfaro, Ed.
    • G. Smith, "On the foundations of quantitative information flow," in Proc. 12th International Conference on Foundations of Software Science and Computational Structures (FoSSaCS '09), ser. Lecture Notes in Computer Science, L. de Alfaro, Ed., vol. 5504, 2009, pp. 288-302.
    • (2009) Lecture Notes in Computer Science , vol.5504 , pp. 288-302
    • Smith, G.1
  • 22
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal of Computing, vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM Journal of Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 23
    • 68549126859 scopus 로고    scopus 로고
    • Quantitative notions of leakage for one-try attacks
    • Proc. 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), ser.
    • C. Braun, K. Chatzikokolakis, and C. Palamidessi, "Quantitative notions of leakage for one-try attacks," in Proc. 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), ser. ENTCS, vol. 249, 2009, pp. 75-91.
    • (2009) ENTCS , vol.249 , pp. 75-91
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 26
    • 54049084647 scopus 로고    scopus 로고
    • A monotonicity principle for information theory
    • Proc. 24th Conference on the Mathematical Foundations of Programming Semantics, ser.
    • K. Chatzikokolakis and K. Martin, "A monotonicity principle for information theory." in Proc. 24th Conference on the Mathematical Foundations of Programming Semantics, ser. Electronic Notes in Theoretical Computer Science, vol. 218, 2008, pp. 111-129.
    • (2008) Electronic Notes in Theoretical Computer Science , vol.218 , pp. 111-129
    • Chatzikokolakis, K.1    Martin, K.2
  • 30
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • C. Dwork, "A firm foundation for private data analysis, "Communications of the ACM, vol. 54, no. 1, 2011.
    • (2011) Communications of the ACM , vol.54 , Issue.1
    • Dwork, C.1
  • 32
    • 77951595720 scopus 로고    scopus 로고
    • Computing the leakage of information-hiding systems
    • Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. J. Esparza and R. Majumdar, Eds.
    • M. Andrés, C. Palamidessi, P. van Rossum, and G. Smith, "Computing the leakage of information-hiding systems," in Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. Lecture Notes in Computer Science, J. Esparza and R. Majumdar, Eds., vol. 6015, 2010, pp. 373-389.
    • (2010) Lecture Notes in Computer Science , vol.6015 , pp. 373-389
    • Andrés, M.1    Palamidessi, C.2    Van Rossum, P.3    Smith, G.4
  • 33
    • 77951581039 scopus 로고    scopus 로고
    • Statistical measurement of information leakage
    • Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. J. Esparza and R. Majumdar, Eds.
    • K. Chatzikokolakis, T. Chothia, and A. Guha, "Statistical measurement of information leakage," in Tools and Algorithms for the Construction and Analysis of Systems (TACAS '10), ser. Lecture Notes in Computer Science, J. Esparza and R. Majumdar, Eds., vol. 6015, 2010, pp. 390-404.
    • (2010) Lecture Notes in Computer Science , vol.6015 , pp. 390-404
    • Chatzikokolakis, K.1    Chothia, T.2    Guha, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.