Searching secrets rationally
From MaRDI portal
Publication:899474
DOI10.1016/J.IJAR.2015.11.010zbMATH Open1344.68184OpenAlexW2182633014MaRDI QIDQ899474FDOQ899474
Michele Boreale, Fabio Corradi
Publication date: 28 December 2015
Published in: International Journal of Approximate Reasoning (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2158/1013529
Learning and adaptive systems in artificial intelligence (68T05) Bayesian problems; characterization of Bayes procedures (62C10) Cryptography (94A60)
Cites Work
- Title not available (Why is that?)
- Elements of Information Theory
- Optimal Statistical Decisions
- Anonymity protocols as noisy channels
- Quantitative notions of leakage for one-try attacks
- On the Foundations of Quantitative Information Flow
- Quantifying information leakage in process calculi
- An extension of the Shannon theory approach to cryptography
- Statistical Genetics and Genetical Statistics: a Forensic Perspective*
- Worst- and average-case privacy breaches in randomization mechanisms
- Quantitative Information Flow, with a View
- Quantitative information flow under generic leakage functions and adaptive adversaries
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- Asymptotic information leakage under one-try attacks
Uses Software
This page was built for publication: Searching secrets rationally
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q899474)