Author:
Braun Christelle,Chatzikokolakis Konstantinos,Palamidessi Catuscia
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Lecture Notes in Computer Science;A. Fujioka,1993
2. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web transactions. ACM Transactions on Information and System Security 1, 66–92 (1998)
3. McLean, J.: Security models and information flow. In: Proc. of SSP, pp. 180–189. IEEE, Los Alamitos (1990)
4. Gray III, J.W.: Toward a mathematical foundation for information flow security. In: Proc. of SSP 1991, pp. 21–35. IEEE, Los Alamitos (1991)
5. ENTCS;D. Clark,2001
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Conditional anonymity with non-probabilistic adversary;Information Sciences;2015-12
2. On the information leakage of differentially-private mechanisms;Journal of Computer Security;2015-09-16
3. Hidden-Markov program algebra with iteration;Mathematical Structures in Computer Science;2014-11-10
4. Asymptotic information leakage under one-try attacks;Mathematical Structures in Computer Science;2014-11-10
5. Quantification of integrity;Mathematical Structures in Computer Science;2014-11-10