{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:54:30Z","timestamp":1725504870473},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540786627"},{"type":"electronic","value":"9783540786634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78663-4_23","type":"book-chapter","created":{"date-parts":[[2008,3,8]],"date-time":"2008-03-08T06:00:01Z","timestamp":1204956001000},"page":"347-362","source":"Crossref","is-referenced-by-count":1,"title":["Formal Approaches to Information-Hiding (Tutorial)"],"prefix":"10.1007","author":[{"given":"Romain","family":"Beauxis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Chatzikokolakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Prakash","family":"Panangaden","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","first-page":"244","volume-title":"ASIACRYPT 1992: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: ASIACRYPT 1992: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, pp. 244\u2013251. Springer, London, UK (1993)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security\u00a01, 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01, 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Syverson, P., Goldschlag, D., Reed, M.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 44\u201354 (1997)","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I. Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 44\u201366. Springer, Heidelberg (2001)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Stubblebine, S.G.: Group principals and the formalization of anonymity. World Congress on Formal Methods\u00a0(1), 814\u2013833 (1999)","DOI":"10.1007\/3-540-48119-2_45"},{"key":"23_CR7","doi-asserted-by":"crossref","first-page":"483","DOI":"10.3233\/JCS-2005-13305","volume":"13","author":"J.Y. Halpern","year":"2005","unstructured":"Halpern, J.Y., O\u2019Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security\u00a013, 483\u2013512 (2005)","journal-title":"Journal of Computer Security"},{"key":"23_CR8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2004-12102","volume":"12","author":"D. Hughes","year":"2004","unstructured":"Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security\u00a012, 3\u201336 (2004)","journal-title":"Journal of Computer Security"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/3-540-61770-1_38","volume-title":"Computer Security - ESORICS 96","author":"S. Schneider","year":"1996","unstructured":"Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 198\u2013218. Springer, Heidelberg (1996)"},{"key":"23_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44810-1_8","volume-title":"Modelling and Analysis of Security Protocols","author":"P.Y. Ryan","year":"2001","unstructured":"Ryan, P.Y., Schneider, S.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)"},{"key":"23_CR11","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying properties of electronic voting protocols. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), Cambridge, UK, 45\u201352 (2006)"},{"key":"23_CR12","first-page":"28","volume-title":"Computer Security Foundations Workshop","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Computer Security Foundations Workshop, pp. 28\u201342. IEEE Computer Society, Los Alamitos (2006)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/11580850_9","volume-title":"Trustworthy Global Computing","author":"K. Chatzikokolakis","year":"2005","unstructured":"Chatzikokolakis, K., Palamidessi, C.: A framework for analyzing probabilistic protocols and its application to the partial secrets exchange. Theoretical Computer Science (2005); In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 146\u2013162. Springer, Heidelberg (2005), http:\/\/www.lix.polytechnique.fr\/~catuscia\/papers\/PartialSecrets\/TCSreport.pdf"},{"key":"23_CR14","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11539452_16","volume-title":"CONCUR 2005 \u2013 Concurrency Theory","author":"M. Bhargava","year":"2005","unstructured":"Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol.\u00a03653, pp. 171\u2013185. Springer, Heidelberg (2005), http:\/\/www.lix.polytechnique.fr\/~catuscia\/papers\/Anonymity\/concur.pdf"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.tcs.2006.08.033","volume":"367","author":"K. Chatzikokolakis","year":"2006","unstructured":"Chatzikokolakis, K., Palamidessi, C.: Probable innocence revisited. Theoretical Computer Science\u00a0367, 123\u2013138 (2006), http:\/\/www.lix.polytechnique.fr\/~catuscia\/papers\/Anonymity\/tcsPI.pdf","journal-title":"Theoretical Computer Science"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"23_CR19","first-page":"514","volume-title":"Proc. of ICDCS","author":"Y. Zhu","year":"2005","unstructured":"Zhu, Y., Bettati, R.: Anonymity vs. information leakage in anonymity systems. In: Proc. of ICDCS, pp. 514\u2013524. IEEE Computer Society, Los Alamitos (2005)"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1005140.1005153","volume-title":"WPES, ACM","author":"I.S. Moskowitz","year":"2003","unstructured":"Moskowitz, I.S., Newman, R.E., Crepeau, D.P., Miller, A.R.: Covert channels and anonymizing networks. In: Jajodia, S., Samarati, P., Syverson, P.F. (eds.) WPES, ACM, pp. 79\u201388. ACM, New York (2003)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Newman, R.E., Syverson, P.F.: Quasi-anonymous channels. In: IASTED CNIS, pp. 126\u2013131 (2003)","DOI":"10.21236\/ADA465128"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. In: Information and Computation (to appear, 2007), http:\/\/www.lix.polytechnique.fr\/~catuscia\/papers\/Anonymity\/Channels\/full.pdf","DOI":"10.1016\/j.ic.2007.07.003"},{"key":"23_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-75227-1_5","volume-title":"Formal Aspects in Security and Trust","author":"Y. Deng","year":"2007","unstructured":"Deng, Y., Pang, J., Wu, P.: Measuring anonymity with relative entropy. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.\u00a04691, pp. 65\u201379. Springer, Heidelberg (2007)"},{"key":"23_CR24","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. Journal of Computer Security. Available as Cornell Computer Science Department Technical Report TR 2007-207 (to appear, 2008)"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"McLean, J.: Security models and information flow. In: IEEE Symposium on Security and Privacy, pp. 180\u2013189 (1990)","DOI":"10.21236\/ADA462529"},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/RISP.1991.130769","volume-title":"Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP 1991)","author":"J.W. Gray III","year":"1991","unstructured":"Gray III, J.W.: Toward a mathematical foundation for information flow security. In: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP 1991), pp. 21\u201335. IEEE, Washington - Brussels - Tokyo (1991)"},{"key":"23_CR27","series-title":"Electr. Notes Theor. Comput. Sci","first-page":"238","volume-title":"Proc. of QAPL 2001","author":"D. Clark","year":"2001","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. In: Proc. of QAPL 2001. Electr. Notes Theor. Comput. Sci, vol.\u00a059 (3), pp. 238\u2013251. Elsevier Science, Amsterdam (2001)"},{"key":"23_CR28","series-title":"Electr. Notes Theor. Comput. Sci","first-page":"149","volume-title":"Proc. of QAPL 2004","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. In: Proc. of QAPL 2004. Electr. Notes Theor. Comput. Sci, vol.\u00a0112, pp. 149\u2013166. Elsevier Science, Amsterdam (2005)"},{"key":"23_CR29","first-page":"18","volume-title":"Proc. of CSFW 2002","author":"G. Lowe","year":"2002","unstructured":"Lowe, G.: Quantifying information flow. In: Proc. of CSFW 2002, pp. 18\u201331. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"23_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/11787006_11","volume-title":"Automata, Languages and Programming","author":"M. Boreale","year":"2006","unstructured":"Boreale, M.: Quantifying information leakage in process calculi. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 119\u2013131. Springer, Heidelberg (2006)"},{"key":"23_CR31","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, Chichester (1991)"},{"key":"23_CR32","unstructured":"Compositional Methods for Information-Hiding. In: FOSSACS 2008, LNCS, vol. 4962, pp. 443\u2013457, Springer, Heidelberg (to appear, 2008)"},{"key":"23_CR33","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/CSF.2007.27","volume-title":"Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)","author":"K. Chatzikokolakis","year":"2007","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in information-hiding protocols. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), pp. 341\u2013354. IEEE Computer Society, Los Alamitos (2007), http:\/\/www.lix.polytechnique.fr\/~catuscia\/papers\/ProbabilityError\/full.pdf"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78663-4_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T22:51:12Z","timestamp":1684277472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78663-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540786627","9783540786634"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78663-4_23","relation":{},"subject":[]}}