共 50 条
- [1] Quantifying Information Leakage of Randomized Protocols VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION (VMCAI 2013), 2013, 7737 : 68 - 87
- [2] INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 134 - 143
- [3] Quantifying information leakage in tree-based hash protocols (Short paper) INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 228 - +
- [4] Information Leakage in Arbiter Protocols AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2018), 2018, 11138 : 404 - 421
- [5] Quantile: Quantifying Information Leakage IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2024 (01): : 433 - 456
- [6] Knowledge Transfer and Information Leakage in Protocols AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2017), 2017, 10482 : 225 - 240
- [7] Quantifying information leakage in RFID systems 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 84 - 89
- [8] Quantifying Information Leakage of Deterministic Encryption CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 129 - 139
- [10] Quantifying information leakage in process calculi AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 119 - 131