Min-Entropy Leakage of Channels in Cascade
暂无分享,去创建一个
[1] R. Gallager. Information Theory and Reliable Communication , 1968 .
[2] Catuscia Palamidessi,et al. Quantitative Notions of Leakage for One-try Attacks , 2009, MFPS.
[3] Geoffrey Smith,et al. Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[4] Gilles Barthe,et al. Information-Theoretic Bounds for Differentially Private Mechanisms , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[5] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[6] A. Rényi. On Measures of Entropy and Information , 1961 .
[7] Anna Lisa Ferrara,et al. Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2013 , 2013 .
[8] A. -B. El-Sayed. Cascaded channels and the equivocation inequality , 1978 .
[9] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[10] Mário S. Alvim,et al. Differential Privacy: On the Trade-Off between Utility and Information Leakage , 2011, Formal Aspects in Security and Trust.
[11] Geoffrey Smith,et al. Computing the Leakage of Information-Hiding Systems , 2010, TACAS.
[12] Michael R. Clarkson,et al. Belief in information flow , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[13] Mário S. Alvim,et al. Probabilistic Information Flow , 2010, 2010 25th Annual IEEE Symposium on Logic in Computer Science.
[14] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[15] Charles A Desoer. Communication through channels in cascade , 1953 .
[16] David Clark,et al. Quantitative Information Flow, Relations and Polymorphic Types , 2005, J. Log. Comput..
[17] A. Rényi,et al. Foundations of probability , 1970 .
[18] J G Daugman,et al. Information Theory and Coding , 1998 .
[19] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[20] Ian Stark,et al. Free-Algebra Models for the pi-Calculus , 2005, FoSSaCS.
[21] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[22] David A. Basin,et al. An information-theoretic model for adaptive side-channel attacks , 2007, CCS '07.
[23] John T. Coffey,et al. On the capacity of a cascade of channels , 1993, IEEE Trans. Inf. Theory.
[24] Vladimiro Sassone,et al. Reconciling Belief and Vulnerability in Information Flow , 2010, 2010 IEEE Symposium on Security and Privacy.