Information leakage

Results: 114



#Item
1Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
2A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
3LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
4Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5Faster Two-Bit Pattern Analysis of Leakage Ziyuan Meng and Geoffrey Smith School of Computing and Information Sciences Florida International University, Miami, FL 33199, USA ,

Faster Two-Bit Pattern Analysis of Leakage Ziyuan Meng and Geoffrey Smith School of Computing and Information Sciences Florida International University, Miami, FL 33199, USA ,

Add to Reading List

Source URL: users.cis.fiu.edu

Language: English - Date: 2013-09-06 08:58:19
    6Calculating Bounds on Information Leakage Using Two-Bit Patterns Ziyuan Meng Geoffrey Smith

    Calculating Bounds on Information Leakage Using Two-Bit Patterns Ziyuan Meng Geoffrey Smith

    Add to Reading List

    Source URL: users.cis.fiu.edu

    Language: English - Date: 2011-10-24 09:10:14
      72016 IEEE 29th Computer Security Foundations Symposium  Axioms for Information Leakage M´ario S. Alvim∗ Carroll Morgan§ ∗

      2016 IEEE 29th Computer Security Foundations Symposium Axioms for Information Leakage M´ario S. Alvim∗ Carroll Morgan§ ∗

      Add to Reading List

      Source URL: users.cis.fiu.edu

      Language: English - Date: 2017-08-28 11:59:30
        8Quantitative Information Leakage Lecture 10 1

        Quantitative Information Leakage Lecture 10 1

        Add to Reading List

        Source URL: www.lix.polytechnique.fr

        Language: English - Date: 2016-04-26 01:57:24
          9Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart∗ ∗

          Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart∗ ∗

          Add to Reading List

          Source URL: www.cs.tau.ac.il

          Language: English - Date: 2009-08-19 10:54:42
            10Quantitative Information Leakage Lecture 8 1

            Quantitative Information Leakage Lecture 8 1

            Add to Reading List

            Source URL: www.lix.polytechnique.fr

            Language: English - Date: 2016-04-21 07:05:34