Searching secrets rationally
From MaRDI portal
Recommendations
- On the Foundations of Quantitative Information Flow
- Quantitative information flow, with a view
- Quantification of positive and negative attacker's information
- Quantitative information flow under generic leakage functions and adaptive adversaries
- Entropy and attack models in information flow (Invited talk)
Cites work
- scientific article; zbMATH DE number 3288321 (Why is no real title available?)
- An extension of the Shannon theory approach to cryptography
- Anonymity protocols as noisy channels
- Asymptotic information leakage under one-try attacks
- Elements of Information Theory
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- On the Foundations of Quantitative Information Flow
- Optimal Statistical Decisions
- Quantifying information leakage in process calculi
- Quantitative information flow under generic leakage functions and adaptive adversaries
- Quantitative information flow, with a view
- Quantitative notions of leakage for one-try attacks
- Statistical Genetics and Genetical Statistics: a Forensic Perspective*
- Worst- and average-case privacy breaches in randomization mechanisms
This page was built for publication: Searching secrets rationally
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q899474)