scientific article; zbMATH DE number 2090930
From MaRDI portal
Publication:4813520
zbMath1045.68694MaRDI QIDQ4813520
Stefaan Seys, Bart Preneel, Claudia Díaz, Joris Claessens
Publication date: 13 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2482/24820054.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items (18)
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ Probabilistic and nondeterministic aspects of anonymity ⋮ The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach ⋮ An information-theoretic model of voting systems ⋮ Probable innocence revisited ⋮ Information theoretical cryptogenography ⋮ A universally composable framework for the privacy of email ecosystems ⋮ Analyzing anonymity attacks through noisy channels ⋮ An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures ⋮ On compositional reasoning about anonymity and privacy in epistemic logic ⋮ Conditional anonymity with non-probabilistic adversary ⋮ Anonymity protocols as noisy channels ⋮ Anonymity Protocols as Noisy Channels ⋮ A Framework for Automatically Checking Anonymity with μCRL ⋮ Evaluation of anonymity and confidentiality protocols using theorem proving ⋮ Compositional Methods for Information-Hiding ⋮ Formalization of Entropy Measures in HOL ⋮ A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database
This page was built for publication: