Probabilistic information flow security
From MaRDI portal
Publication:5506366
Recommendations
Cited in
(19)- Tempus fugit: How to plug it
- Information-Flow Attacks Based on Limited Observations
- The complexity of synchronous notions of information flow security
- Observation based system security
- Decidability of Parameterized Probabilistic Information Flow
- scientific article; zbMATH DE number 5139437 (Why is no real title available?)
- scientific article; zbMATH DE number 1948404 (Why is no real title available?)
- The complexity of synchronous notions of information flow security
- scientific article; zbMATH DE number 1863164 (Why is no real title available?)
- Information flow certificates
- scientific article; zbMATH DE number 2090700 (Why is no real title available?)
- From operational models to information theory; side channels in pGCL with Isabelle
- Timing-sensitive information flow analysis for synchronous systems
- Quantifying security for timed process algebras
- Formal methods and automated tool for timing-channel identification in TCB source code
- Formal models of timing attacks on web privacy
- Network information flow
- Transforming out timing leaks
- Slot games for detecting timing leaks of programs
This page was built for publication: Probabilistic information flow security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5506366)