Statistical Measurement of Information Leakage
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Quantifying maximal loss of anonymity in protocolsPublished by Association for Computing Machinery (ACM) ,2009
- On the Bayes risk in information-hiding protocolsJournal of Computer Security, 2008
- Anonymity protocols as noisy channelsInformation and Computation, 2008
- Formally Bounding the Side-Channel Leakage in Unknown-Message AttacksLecture Notes in Computer Science, 2008
- Measuring Anonymity with Relative EntropyLecture Notes in Computer Science, 2007
- A static analysis for quantifying information flow in a simple imperative languageJournal of Computer Security, 2007
- Mixminion: design of a type III anonymous remailer protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Towards Measuring AnonymityLecture Notes in Computer Science, 2003
- Computation of channel capacity and rate-distortion functionsIEEE Transactions on Information Theory, 1972
- An algorithm for computing the capacity of arbitrary discrete memoryless channelsIEEE Transactions on Information Theory, 1972