메뉴 건너뛰기




Volumn 8788, Issue , 2014, Pages 181-196

Browser randomisation against fingerprinting: A quantitative information flow approach

Author keywords

[No Author keywords available]

Indexed keywords

QUANTITATIVE INFORMATION FLOWS; RANDOMISATION;

EID: 84910077443     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11599-3_11     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 2
    • 84885011833 scopus 로고    scopus 로고
    • Hybrid information flow monitoring against web tracking
    • IEEE
    • Besson, F., Bielova, N., Jensen, T.: Hybrid information flow monitoring against web tracking. In: CSF 2013, pp. 240–254. IEEE (2013)
    • (2013) CSF 2013 , pp. 240-254
    • Besson, F.1    Bielova, N.2    Jensen, T.3
  • 5
  • 8
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.), LNCS, Springer, Heidelberg
    • Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
    • (2006) ICALP 2006 , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 9
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • In: Halevi, S., Rabin, T. (eds.), LNCS, Springer, Heidelberg
    • Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)
    • (2006) TCC 2006 , vol.3876 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 11
    • 84875021951 scopus 로고    scopus 로고
    • Min-entropy as a resource
    • Espinoza, B., Smith, G.: Min-entropy as a resource. Inf. Comp. 226, 57–75 (2013)
    • (2013) Inf. Comp , vol.226 , pp. 57-75
    • Espinoza, B.1    Smith, G.2
  • 12
    • 84870761374 scopus 로고    scopus 로고
    • Operational versus weakest precondition semantics for the probabilistic guarded command language
    • IEEE
    • Gretz, F., Katoen, J.-P., McIver, A.: Operational versus weakest precondition semantics for the probabilistic guarded command language. In: QEST, pp. 168–177. IEEE (2012)
    • (2012) QEST , pp. 168-177
    • Gretz, F.1    Katoen, J.-P.2    McIver, A.3
  • 13
    • 84909645122 scopus 로고    scopus 로고
    • Precise quantitative information flow analysis - a symbolic approach
    • Klebanov, V.: Precise quantitative information flow analysis - a symbolic approach. Theor. Comput. Sci. 538, 124–139 (2014)
    • (2014) Theor. Comput. Sci , vol.538 , pp. 124-139
    • Klebanov, V.1
  • 14
    • 84882759876 scopus 로고    scopus 로고
    • SAT-based analysis and quantification of information flow in programs
    • In: Joshi, K., Siegle, M., Stoelinga, M., D’Argenio, P.R. (eds.), LNCS, Springer, Heidelberg
    • Klebanov, V., Manthey, N., Muise, C.: SAT-based analysis and quantification of information flow in programs. In: Joshi, K., Siegle, M., Stoelinga, M., D’Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 177–192. Springer, Heidelberg (2013)
    • (2013) QEST 2013 , vol.8054 , pp. 177-192
    • Klebanov, V.1    Manthey, N.2    Muise, C.3
  • 15
    • 77957604761 scopus 로고    scopus 로고
    • Approximation and randomization for quantitative information-flow analysis
    • IEEE
    • Köpf, B., Rybalchenko, A.: Approximation and randomization for quantitative information-flow analysis. In: CSF 2010, pp. 3–14. IEEE (2010)
    • (2010) CSF 2010 , pp. 3-14
    • Köpf, B.1    Rybalchenko, A.2
  • 16
    • 80052654881 scopus 로고    scopus 로고
    • Dynamic Enforcement of Knowledge-based Security Policies
    • IEEE
    • Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic Enforcement of Knowledge-based Security Policies. In: CSF 2011, pp. 114–128. IEEE (2011)
    • (2011) CSF 2011 , pp. 114-128
    • Mardziel, P.1    Magill, S.2    Hicks, M.3    Srivatsa, M.4
  • 17
    • 84883726322 scopus 로고    scopus 로고
    • Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
    • Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. Journal of Computer Security 21(4), 463–532 (2013)
    • (2013) Journal of Computer Security , vol.21 , Issue.4 , pp. 463-532
    • Mardziel, P.1    Magill, S.2    Hicks, M.3    Srivatsa, M.4
  • 19
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • ACM
    • Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: Output perturbation for queries with joins. In: PODS 2009, pp. 107–116. ACM (2009)
    • (2009) PODS 2009 , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4
  • 21
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 571–588 (2002)
    • (2002) Int. J. Uncertain. Fuzziness Knowl.-Based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 22
    • 34547245432 scopus 로고    scopus 로고
    • Counting integer points in parametric polytopes using barvinok’s rational functions
    • Verdoolaege, S., Seghir, R., Beyls, K., Loechner, V., Bruynooghe, M.: Counting integer points in parametric polytopes using barvinok’s rational functions. Algorithmica 48(1), 37–66 (2007)
    • (2007) Algorithmica , vol.48 , Issue.1 , pp. 37-66
    • Verdoolaege, S.1    Seghir, R.2    Beyls, K.3    Loechner, V.4    Bruynooghe, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.