Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Sabelfeld, A., Myers, A.C.: Language-based information flow security. IEEE Journal on Selected Areas in Communications 21(1), 5–19 (2003)
2. Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation 206, 378–401 (2008)
3. Köpf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proceedings 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia (2007)
4. Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proceedings 18th IEEE Computer Security Foundations Workshop (June 2005)
5. Denning, D.: Cryptography and Data Security. Addison-Wesley, Reading (1982)
Cited by
212 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献