Quantifying Opacity
暂无分享,去创建一个
[1] Michele Boreale,et al. Quantitative Information Flow, with a View , 2011, ESORICS.
[2] Michele Boreale,et al. Asymptotic information leakage under one-try attacks† , 2011, Mathematical Structures in Computer Science.
[3] Feng Lin,et al. Opacity of discrete event systems and its applications , 2011, Autom..
[4] Mathieu Sassolas,et al. Quantifying Opacity , 2010, 2010 Seventh International Conference on the Quantitative Evaluation of Systems.
[5] Mário S. Alvim,et al. Information Flow in Interactive Systems , 2010, CONCUR.
[6] Annabelle McIver,et al. Compositional Closure for Bayes Risk in Probabilistic Noninterference , 2010, ICALP.
[7] Geoffrey Smith,et al. Computing the Leakage of Information-Hiding Systems , 2010, TACAS.
[8] Philippe Darondeau,et al. Supervisory Control for Opacity , 2010, IEEE Transactions on Automatic Control.
[9] Pedro R. D'Argenio,et al. On the Expressive Power of Schedulers in Distributed Probabilistic Systems , 2009, Electron. Notes Theor. Comput. Sci..
[10] Alessandro Aldini,et al. A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference , 2009, ARSPA-WITS.
[11] Siu Cheung Kong,et al. An experience of teaching for learning by observation: Remote-controlled experiments on electrical circuits , 2009, Comput. Educ..
[12] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[13] Chia-Hung Wang,et al. Optimal multi-level thresholding using a two-stage Otsu optimization approach , 2009, Pattern Recognit. Lett..
[14] Heiko Mantel,et al. Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels , 2008, Formal Aspects in Security and Trust.
[15] Maciej Koutny,et al. Opacity generalised to transition systems , 2005, International Journal of Information Security.
[16] Sven K. Esche,et al. A Remotely Accessed Flow Rig Student Laboratory , 2008 .
[17] Prakash Panangaden,et al. Anonymity protocols as noisy channels , 2006, Inf. Comput..
[18] Michele Boreale,et al. Quantifying information leakage in process calculi , 2006, Inf. Comput..
[19] Pavol Cerný,et al. Preserving Secrecy Under Refinement , 2006, ICALP.
[20] Sven K. Esche,et al. A Virtual Laboratory On Fluid Mechanics , 2006 .
[21] Etienne Decencière,et al. Image filtering using morphological amoebas , 2007, Image Vis. Comput..
[22] Bengt Jonsson,et al. A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.
[23] B. Nordstrom. FINITE MARKOV CHAINS , 2005 .
[24] Yassine Lakhnech,et al. Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme , 2005, IACR Cryptol. ePrint Arch..
[25] Laurent Mazaré,et al. Decidability of Opacity with Non-Atomic Keys , 2004, Formal Aspects in Security and Trust.
[26] Gavin Lowe,et al. Defining information flow quantity , 2004, J. Comput. Secur..
[27] Mario Bravetti,et al. A Process Algebraic Approach for the Analysis of Probabilistic Non-interference , 2011 .
[28] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[29] Larry S. Davis,et al. W4: Real-Time Surveillance of People and Their Activities , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[30] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[31] Roberto Segala,et al. Modeling and verification of randomized distributed real-time systems , 1996 .
[32] Andrea Bianco,et al. Model Checking of Probabalistic and Nondeterministic Systems , 1995, FSTTCS.
[33] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[34] Mihalis Yannakakis,et al. Markov Decision Processes and Regular Events (Extended Abstract) , 1990, ICALP.
[35] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[36] Jonathan K. Millen,et al. Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.
[37] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[38] B. Massey,et al. Mechanics of Fluids , 2018 .
[39] Michele Boreale,et al. Quantitative Information Flow, with a View , 2011, ESORICS.
[40] Michele Boreale,et al. Asymptotic information leakage under one-try attacks† , 2011, Mathematical Structures in Computer Science.
[41] Feng Lin,et al. Opacity of discrete event systems and its applications , 2011, Autom..
[42] Mário S. Alvim,et al. Information Flow in Interactive Systems , 2010, CONCUR.
[43] Annabelle McIver,et al. Compositional Closure for Bayes Risk in Probabilistic Noninterference , 2010, ICALP.
[44] Geoffrey Smith,et al. Computing the Leakage of Information-Hiding Systems , 2010, TACAS.
[45] Philippe Darondeau,et al. Supervisory Control for Opacity , 2010, IEEE Transactions on Automatic Control.
[46] Pedro R. D'Argenio,et al. On the Expressive Power of Schedulers in Distributed Probabilistic Systems , 2009, Electron. Notes Theor. Comput. Sci..
[47] Alessandro Aldini,et al. A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference , 2009, ARSPA-WITS.
[48] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[49] Heiko Mantel,et al. Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels , 2008, Formal Aspects in Security and Trust.
[50] Maciej Koutny,et al. Opacity generalised to transition systems , 2005, International Journal of Information Security.
[51] Prakash Panangaden,et al. Anonymity protocols as noisy channels , 2006, Inf. Comput..
[52] Pavol Cerný,et al. Preserving Secrecy Under Refinement , 2006, ICALP.
[53] Michele Boreale,et al. Quantifying information leakage in process calculi , 2006, Inf. Comput..
[54] Bengt Jonsson,et al. A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.
[55] B. Nordstrom. FINITE MARKOV CHAINS , 2005 .
[56] Yassine Lakhnech,et al. Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme , 2005, IACR Cryptol. ePrint Arch..
[57] Laurent Mazaré,et al. Decidability of Opacity with Non-Atomic Keys , 2004, Formal Aspects in Security and Trust.
[58] Gavin Lowe,et al. Defining information flow quantity , 2004, J. Comput. Secur..
[59] Mario Bravetti,et al. A Process Algebraic Approach for the Analysis of Probabilistic Non-interference , 2011 .
[60] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[61] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[62] Markov decision processes and regular events , 1998, IEEE Trans. Autom. Control..
[63] Roberto Segala,et al. Modeling and verification of randomized distributed real-time systems , 1996 .
[64] Andrea Bianco,et al. Model Checking of Probabalistic and Nondeterministic Systems , 1995, FSTTCS.
[65] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[66] Jonathan K. Millen,et al. Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.
[67] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.