Author:
Hamadou Sardaouna,Sassone Vladimiro,Palamidessi Catuscia
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Quantifying leakage in the presence of unreliable sources of information;Journal of Computer and System Sciences;2017-09
2. Short Paper;Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security;2016-10-24
3. Conditional anonymity with non-probabilistic adversary;Information Sciences;2015-12
4. Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy;IEEE Journal of Selected Topics in Signal Processing;2015-10
5. Compositional methods for information-hiding;Mathematical Structures in Computer Science;2014-11-24