Quantifying leakage in the presence of unreliable sources of information
DOI10.1016/j.jcss.2017.03.013zbMath1371.68073OpenAlexW2594357545MaRDI QIDQ2361344
Sardaouna Hamadou, Catuscia Palamidessi, Vladimiro Sassone
Publication date: 30 June 2017
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://eprints.soton.ac.uk/403793/1/belief.pdf
uncertaintyaccuracyprobabilistic modelsinformation hidingquantitative information flowbelief combination
Data encryption (aspects in computer science) (68P25) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Distances in evidence theory: comprehensive survey and generalizations
- Probable innocence revisited
- On the Dempster-Shafer framework and new combination rules
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- Belief functions: The disjunctive rule of combination and the generalized Bayesian theorem
- Decision making in the TBM: the necessity of the pignistic transformation
- Possibility theory, probability theory and multiple-valued logics: a clarification
- Anonymity protocols as noisy channels
- Classic works on the Dempster-Shafer theory of belief functions
- Quantitative Notions of Leakage for One-try Attacks
- Computing Information Flow Using Symbolic Model-Checking
- Quantitative Information Flow, Relations and Polymorphic Types
- Assessing security threats of looping constructs
- Statistical Measurement of Information Leakage
- On the Foundations of Quantitative Information Flow
- CSP and anonymity
- Elements of Information Theory
- Abstract Channels and Their Robust Information-Leakage Ordering
- Quantification of integrity
- CONCUR 2005 – Concurrency Theory
This page was built for publication: Quantifying leakage in the presence of unreliable sources of information