Science of Quantitative Information Flow
-15%
portes grátis
Science of Quantitative Information Flow
Smith, Geoffrey; Chatzikokolakis, Konstantinos; Alvim, Mario S.; Morgan, Carroll; McIver, Annabelle; Palamidessi, Catuscia
Springer International Publishing AG
09/2020
478
Dura
Inglês
9783319961293
15 a 20 dias
922
Descrição não disponível.
Part I, Motivation.- Introduction.- Part II, Secrets and How to Measure Them.- Modeling Secrets.- On g-Vulnerability.- Part III, Channels and Information Leakage.- Channels.- Posterior Vulnerability and Leakage.- Robustness.- Capacity.- Composition of Channels.- Refinement.- The Dalenius Perspective.- Axiomatics.- The Geometry of Hypers, Gains, and Losses.- Part IV, Information Leakage in Sequential Programs.- Quantitative Information Flow in Sequential Computer Programs.- Hidden-Markov Modeling of QIF in Programs.- Program Algebra for QIF.- Iteration and Non-termination.- A Demonic Lattice of Information.- Part V, Applications.- The Crowds Protocol.- Timing Attacks on Blinded and Bucketed Cryptography.- Defense Against Side Channels.- Multi-party Computation: The Three Judges Protocol.- Voting Systems.- Differential Privacy.- Glossary and Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computer Security;Disorder Measures;Hidden Markov Models (HMMs);Information Flow;Information Theory;Program Semantics;Static Analysis;Vulnerability Measures
Part I, Motivation.- Introduction.- Part II, Secrets and How to Measure Them.- Modeling Secrets.- On g-Vulnerability.- Part III, Channels and Information Leakage.- Channels.- Posterior Vulnerability and Leakage.- Robustness.- Capacity.- Composition of Channels.- Refinement.- The Dalenius Perspective.- Axiomatics.- The Geometry of Hypers, Gains, and Losses.- Part IV, Information Leakage in Sequential Programs.- Quantitative Information Flow in Sequential Computer Programs.- Hidden-Markov Modeling of QIF in Programs.- Program Algebra for QIF.- Iteration and Non-termination.- A Demonic Lattice of Information.- Part V, Applications.- The Crowds Protocol.- Timing Attacks on Blinded and Bucketed Cryptography.- Defense Against Side Channels.- Multi-party Computation: The Three Judges Protocol.- Voting Systems.- Differential Privacy.- Glossary and Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.