Searching secrets rationally
From MaRDI portal
Publication:899474
DOI10.1016/j.ijar.2015.11.010zbMath1344.68184OpenAlexW2182633014MaRDI QIDQ899474
Michele Boreale, Fabio Corradi
Publication date: 28 December 2015
Published in: International Journal of Approximate Reasoning (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2158/1013529
Bayesian problems; characterization of Bayes procedures (62C10) Learning and adaptive systems in artificial intelligence (68T05) Cryptography (94A60)
Uses Software
Cites Work
- Unnamed Item
- Quantifying information leakage in process calculi
- Anonymity protocols as noisy channels
- Worst- and average-case privacy breaches in randomization mechanisms
- Quantitative Notions of Leakage for One-try Attacks
- Quantitative Information Flow, with a View
- Optimal Statistical Decisions
- Quantitative information flow under generic leakage functions and adaptive adversaries
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- On the Foundations of Quantitative Information Flow
- An extension of the Shannon theory approach to cryptography
- Statistical Genetics and Genetical Statistics: a Forensic Perspective*
- Elements of Information Theory
- Asymptotic information leakage under one-try attacks
This page was built for publication: Searching secrets rationally