Probabilistic information flow security
From MaRDI portal
Publication:5506366
zbMATH Open1158.68030MaRDI QIDQ5506366FDOQ5506366
Authors: Damas Gruska
Publication date: 28 January 2009
Recommendations
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Authentication, digital signatures and secret sharing (94A62)
Cited In (19)
- Title not available (Why is that?)
- Transforming out timing leaks
- The complexity of synchronous notions of information flow security
- The complexity of synchronous notions of information flow security
- Information flow certificates
- Title not available (Why is that?)
- Title not available (Why is that?)
- Tempus fugit: How to plug it
- Decidability of Parameterized Probabilistic Information Flow
- Network information flow
- Slot games for detecting timing leaks of programs
- Observation based system security
- Title not available (Why is that?)
- Formal methods and automated tool for timing-channel identification in TCB source code
- Timing-sensitive information flow analysis for synchronous systems
- Quantifying security for timed process algebras
- Formal models of timing attacks on web privacy
- From operational models to information theory; side channels in pGCL with Isabelle
- Information-Flow Attacks Based on Limited Observations
This page was built for publication: Probabilistic information flow security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5506366)