Adversaries and Information Leaks (Tutorial)
- 8 March 2008
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- On the computational soundness of cryptographically masked flowsPublished by Association for Computing Machinery (ACM) ,2008
- Computationally Sound Typing for Non-interference: The Case of Deterministic EncryptionPublished by Springer Nature ,2007
- Secure information flow with random assignment and encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Cryptographically-Masked FlowsPublished by Springer Nature ,2006
- A Type System for Computationally Secure Information FlowPublished by Springer Nature ,2005
- Handling Encryption in an Analysis for Secure Information FlowPublished by Springer Nature ,2003
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Semantics and Program Analysis of Computationally Secure Information FlowPublished by Springer Nature ,2001
- A sound type system for secure flow analysisJournal of Computer Security, 1996
- Certification of programs for secure information flowCommunications of the ACM, 1977