-
1
-
-
84889043880
-
FPDetective: Dusting the web for fingerprinters
-
ACM
-
Acar, G., Juárez, M., Nikiforakis, N., Díaz, C., Gürses, S.F., Piessens, F., Preneel, B.: FPDetective: dusting the web for fingerprinters. In: CCS 2013, pp. 1129-1140. ACM (2013)
-
(2013)
CCS 2013
, pp. 1129-1140
-
-
Acar, G.1
Juárez, M.2
Nikiforakis, N.3
Díaz, C.4
Gürses, S.F.5
Piessens, F.6
Preneel, B.7
-
2
-
-
84885011833
-
Hybrid information flow monitoring against web tracking
-
IEEE
-
Besson, F., Bielova, N., Jensen, T.: Hybrid information flow monitoring against web tracking. In: CSF 2013, pp. 240–254. IEEE (2013)
-
(2013)
CSF 2013
, pp. 240-254
-
-
Besson, F.1
Bielova, N.2
Jensen, T.3
-
3
-
-
84910055634
-
-
Technical Report 8532, Inria
-
Besson, F., Bielova, N., Jensen, T.: Enforcing browser anonymity with quantitative information flow. Technical Report 8532, Inria (2014)
-
(2014)
Enforcing browser anonymity with quantitative information flow
-
-
Besson, F.1
Bielova, N.2
Jensen, T.3
-
5
-
-
84889000449
-
-
Boda, K.: Firegloves, http://fingerprint.pet-portal.eu/?menu=6
-
Firegloves
-
-
Boda, K.1
-
6
-
-
70449455866
-
Quantifying information flow with beliefs
-
Clarkson, M.R., Myers, A.C., Schneider, F.B.: Quantifying information flow with beliefs. Journal of Computer Security 17(5), 655–701 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.5
, pp. 655-701
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
8
-
-
33746335051
-
Differential privacy
-
In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.), LNCS, Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
-
(2006)
ICALP 2006
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
9
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
In: Halevi, S., Rabin, T. (eds.), LNCS, Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)
-
(2006)
TCC 2006
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
11
-
-
84875021951
-
Min-entropy as a resource
-
Espinoza, B., Smith, G.: Min-entropy as a resource. Inf. Comp. 226, 57–75 (2013)
-
(2013)
Inf. Comp
, vol.226
, pp. 57-75
-
-
Espinoza, B.1
Smith, G.2
-
12
-
-
84870761374
-
Operational versus weakest precondition semantics for the probabilistic guarded command language
-
IEEE
-
Gretz, F., Katoen, J.-P., McIver, A.: Operational versus weakest precondition semantics for the probabilistic guarded command language. In: QEST, pp. 168–177. IEEE (2012)
-
(2012)
QEST
, pp. 168-177
-
-
Gretz, F.1
Katoen, J.-P.2
McIver, A.3
-
13
-
-
84909645122
-
Precise quantitative information flow analysis - a symbolic approach
-
Klebanov, V.: Precise quantitative information flow analysis - a symbolic approach. Theor. Comput. Sci. 538, 124–139 (2014)
-
(2014)
Theor. Comput. Sci
, vol.538
, pp. 124-139
-
-
Klebanov, V.1
-
14
-
-
84882759876
-
SAT-based analysis and quantification of information flow in programs
-
In: Joshi, K., Siegle, M., Stoelinga, M., D’Argenio, P.R. (eds.), LNCS, Springer, Heidelberg
-
Klebanov, V., Manthey, N., Muise, C.: SAT-based analysis and quantification of information flow in programs. In: Joshi, K., Siegle, M., Stoelinga, M., D’Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 177–192. Springer, Heidelberg (2013)
-
(2013)
QEST 2013
, vol.8054
, pp. 177-192
-
-
Klebanov, V.1
Manthey, N.2
Muise, C.3
-
15
-
-
77957604761
-
Approximation and randomization for quantitative information-flow analysis
-
IEEE
-
Köpf, B., Rybalchenko, A.: Approximation and randomization for quantitative information-flow analysis. In: CSF 2010, pp. 3–14. IEEE (2010)
-
(2010)
CSF 2010
, pp. 3-14
-
-
Köpf, B.1
Rybalchenko, A.2
-
16
-
-
80052654881
-
Dynamic Enforcement of Knowledge-based Security Policies
-
IEEE
-
Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic Enforcement of Knowledge-based Security Policies. In: CSF 2011, pp. 114–128. IEEE (2011)
-
(2011)
CSF 2011
, pp. 114-128
-
-
Mardziel, P.1
Magill, S.2
Hicks, M.3
Srivatsa, M.4
-
17
-
-
84883726322
-
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
-
Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. Journal of Computer Security 21(4), 463–532 (2013)
-
(2013)
Journal of Computer Security
, vol.21
, Issue.4
, pp. 463-532
-
-
Mardziel, P.1
Magill, S.2
Hicks, M.3
Srivatsa, M.4
-
18
-
-
84881238242
-
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
-
Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 541–555 (2013)
-
(2013)
IEEE Symposium on Security and Privacy
, pp. 541-555
-
-
Nikiforakis, N.1
Kapravelos, A.2
Joosen, W.3
Kruegel, C.4
Piessens, F.5
Vigna, G.6
-
19
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
ACM
-
Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: Output perturbation for queries with joins. In: PODS 2009, pp. 107–116. ACM (2009)
-
(2009)
PODS 2009
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
21
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 571–588 (2002)
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
22
-
-
34547245432
-
Counting integer points in parametric polytopes using barvinok’s rational functions
-
Verdoolaege, S., Seghir, R., Beyls, K., Loechner, V., Bruynooghe, M.: Counting integer points in parametric polytopes using barvinok’s rational functions. Algorithmica 48(1), 37–66 (2007)
-
(2007)
Algorithmica
, vol.48
, Issue.1
, pp. 37-66
-
-
Verdoolaege, S.1
Seghir, R.2
Beyls, K.3
Loechner, V.4
Bruynooghe, M.5
|