On the Foundations of Quantitative Information Flow
Top Cited Papers
- 1 January 2009
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Lagrange multipliers and maximum information leakage in different observational modelsPublished by Association for Computing Machinery (ACM) ,2008
- Adversaries and Information Leaks (Tutorial)Published by Springer Nature ,2008
- Anonymity protocols as noisy channelsInformation and Computation, 2008
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- An information-theoretic model for adaptive side-channel attacksPublished by Association for Computing Machinery (ACM) ,2007
- Assessing security threats of looping constructsPublished by Association for Computing Machinery (ACM) ,2007
- Quantitative Information Flow, Relations and Polymorphic TypesJournal of Logic and Computation, 2005
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Quantitative Analysis of the Leakage of Confidential DataElectronic Notes in Theoretical Computer Science, 2002
- A Mathematical Theory of CommunicationBell System Technical Journal, 1948