Pages that link to "Item:Q3617736"
From MaRDI portal
The following pages link to On the Foundations of Quantitative Information Flow (Q3617736):
Displaying 41 items.
- Min-entropy as a resource (Q385717) (← links)
- Thermodynamic aspects of confidentiality (Q385720) (← links)
- Maximizing entropy over Markov processes (Q465487) (← links)
- Analyzing anonymity attacks through noisy channels (Q498398) (← links)
- Information hiding in probabilistic concurrent systems (Q549174) (← links)
- Probabilistic and nondeterministic aspects of anonymity (Q843094) (← links)
- Searching secrets rationally (Q899474) (← links)
- Conditional anonymity with non-probabilistic adversary (Q1750044) (← links)
- An algebraic approach for reasoning about information flow (Q2024334) (← links)
- Attainable unconditional security for shared-key cryptosystems (Q2282054) (← links)
- Sampling automata and programs (Q2339473) (← links)
- Quantifying leakage in the presence of unreliable sources of information (Q2361344) (← links)
- Complexity and resource bound analysis of imperative programs using difference constraints (Q2398171) (← links)
- Hybrid statistical estimation of mutual information and its application to information flow (Q2414250) (← links)
- An axiomatization of information flow measures (Q2422017) (← links)
- Program algebra for quantitative information flow (Q2423771) (← links)
- Precise quantitative information flow analysis -- a symbolic approach (Q2453114) (← links)
- Quantitative information flow as safety and liveness hyperproperties (Q2453117) (← links)
- Worst- and average-case privacy breaches in randomization mechanisms (Q2517234) (← links)
- Quantifying information leakage of randomized protocols (Q2517235) (← links)
- Quantitative Notions of Leakage for One-try Attacks (Q2805152) (← links)
- Security of Numerical Sensors in Automata (Q2947411) (← links)
- Compositional methods for information-hiding (Q2971070) (← links)
- On the Relation between Differential Privacy and Quantitative Information Flow (Q3012909) (← links)
- Quantitative Information Flow and Applications to Differential Privacy (Q3092184) (← links)
- (Q3121523) (← links)
- Quantifying Vulnerability of Secret Generation Using Hyper-Distributions (Q3304804) (← links)
- Secure Multi-party Computation: Information Flow of Outputs and Game Theory (Q3304808) (← links)
- Security Analysis of Cache Replacement Policies (Q3304814) (← links)
- Compositional Synthesis of Leakage Resilient Programs (Q3304821) (← links)
- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows (Q3304822) (← links)
- Information Theory and Security: Quantitative Information Flow (Q3575030) (← links)
- On Privacy and Accuracy in Data Releases (Invited Paper) (Q5089262) (← links)
- Algebra for Quantitative Information Flow (Q5283199) (← links)
- Automation of Quantitative Information-Flow Analysis (Q5300883) (← links)
- Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms (Q5418970) (← links)
- Preface to the special issue on quantitative information flow (Q5740621) (← links)
- Asymptotic information leakage under one-try attacks (Q5740624) (← links)
- An analysis of trust in anonymity networks in the presence of adaptive attackers (Q5740628) (← links)
- Evaluation of anonymity and confidentiality protocols using theorem proving (Q5962971) (← links)
- Utility/privacy trade-off as regularized optimal transport (Q6201932) (← links)