메뉴 건너뛰기




Volumn 6858 LNCS, Issue , 2011, Pages 211-230

Quantitative information flow and applications to differential privacy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL SYSTEM; DIFFERENTIAL PRIVACIES; INFORMATION FLOWS; INFORMATION-THEORETIC APPROACH; MIN-ENTROPY; QUANTITATIVE INFORMATION; QUANTITIVE; SECURE INFORMATION FLOW; SHANNON ENTROPY; STATISTICAL DATABASE;

EID: 84857745356     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23082-0_8     Document Type: Article
Times cited : (17)

References (30)
  • 3
    • 80052677847 scopus 로고    scopus 로고
    • Information-theoretic bounds for differentially private mechanisms
    • to appear
    • Barthe, G., Köpf, B.: Information-theoretic bounds for differentially private mechanisms. In: Proc. of CSF (to appear, 2011)
    • (2011) Proc. of CSF
    • Barthe, G.1    Köpf, B.2
  • 7
    • 0023861309 scopus 로고
    • Dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65-75 (1988) (Pubitemid 18606152)
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum David1
  • 8
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • DOI 10.1093/logcom/exi009, Lambda Calculus, Type Theory and Natural Language
    • Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. J. of Logic and Computation 18(2), 181-199 (2005) (Pubitemid 40860589)
    • (2005) Journal of Logic and Computation , vol.15 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 10
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 38(1), 97-139 (2008)
    • (2008) SIAM Journal of Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 11
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • In: Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 14
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • Dwork, C.: A firm foundation for private data analysis. Communications of the ACM 54(1), 86-96 (2011)
    • (2011) Communications of the ACM , vol.54 , Issue.1 , pp. 86-96
    • Dwork, C.1
  • 17
    • 77953239541 scopus 로고    scopus 로고
    • Applied quantitative information flow and statistical databases
    • In: Degano, P., Guttman, J.D. (eds.) Springer, Heidelberg
    • Heusser, J., Malacaria, P.: Applied quantitative information flow and statistical databases. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 96-110. Springer, Heidelberg (2010)
    • (2010) FAST 2009. LNCS , vol.5983 , pp. 96-110
    • Heusser, J.1    Malacaria, P.2
  • 18
    • 0035263743 scopus 로고    scopus 로고
    • Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity
    • Joinson, A.N.: Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. Eur. J. Soc. Psychol. 31(2), 177-192 (2001)
    • (2001) Eur. J. Soc. Psychol. , vol.31 , Issue.2 , pp. 177-192
    • Joinson, A.N.1
  • 19
    • 67650696756 scopus 로고    scopus 로고
    • An information-theoretic model for adaptive side-channel attacks
    • ACM, New York
    • Köpf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Proc. of CCS, pp. 286-296. ACM, New York (2007)
    • (2007) Proc. of CCS , pp. 286-296
    • Köpf, B.1    Basin, D.A.2
  • 20
    • 67650696756 scopus 로고    scopus 로고
    • An information-theoretic model for adaptive side-channel attacks
    • ACM, New York
    • Köpf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Proc. of CCS, pp. 286-296. ACM, New York (2007)
    • (2007) Proc. of CCS , pp. 286-296
    • Köpf, B.1    Basin, D.A.2
  • 21
    • 33846535380 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • ACM, New York
    • Malacaria, P.: Assessing security threats of looping constructs. In: Proc. of POPL, pp. 225-235. ACM, New York (2007)
    • (2007) Proc. of POPL , pp. 225-235
    • Malacaria, P.1
  • 22
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • ACM, New York
    • Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: Proc. of PLAS, pp. 135-146. ACM, New York (2008)
    • (2008) Proc. of PLAS , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 23
    • 84944047666 scopus 로고
    • Massey: Guessing and entropy
    • IEEE, Los Alamitos
    • Massey: Guessing and entropy. In: Proc. of ISIT, p. 204. IEEE, Los Alamitos (1994)
    • (1994) Proc. of ISIT , pp. 204
  • 26
    • 84947756322 scopus 로고    scopus 로고
    • On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
    • Progress in Cryptology - INDOCRYPT 2000
    • Pliam, J.O.: On the incomparability of entropy and marginal guesswork in bruteforce attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000) (Pubitemid 33210840)
    • (2000) Lecture Notes in Computer Science , Issue.1977 , pp. 67-79
    • Pliam, J.O.1
  • 28
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 625-656
    • Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 625-656 (1948)
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 29
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • In: de Alfaro, L. (ed.) Springer, Heidelberg
    • Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
    • (2009) FOSSACS 2009. LNCS , vol.5504 , pp. 288-302
    • Smith, G.1
  • 30
    • 27944454436 scopus 로고    scopus 로고
    • Anonymity vs. information leakage in anonymity systems
    • IEEE, Los Alamitos
    • Zhu, Y., Bettati, R.: Anonymity vs. information leakage in anonymity systems. In: Proc. of ICDCS, pp. 514-524. IEEE, Los Alamitos (2005)
    • (2005) Proc. of ICDCS , pp. 514-524
    • Zhu, Y.1    Bettati, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.