{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:54:51Z","timestamp":1725504891182},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540786627"},{"type":"electronic","value":"9783540786634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78663-4_25","type":"book-chapter","created":{"date-parts":[[2008,3,8]],"date-time":"2008-03-08T06:00:01Z","timestamp":1204956001000},"page":"383-400","source":"Crossref","is-referenced-by-count":8,"title":["Adversaries and Information Leaks (Tutorial)"],"prefix":"10.1007","author":[{"given":"Geoffrey","family":"Smith","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"7","key":"25_CR2","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D. Denning","year":"1977","unstructured":"Denning, D., Denning, P.: Certification of programs for secure information flow. Communications of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Communications of the ACM"},{"issue":"2,3","key":"25_CR3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(2,3), 167\u2013187 (1996)","journal-title":"Journal of Computer Security"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Smith, G., Alp\u00edzar, R.: Secure information flow with random assignment and encryption. In: Proc. 4th ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia, pp. 33\u201343 (November 2006)","DOI":"10.1145\/1180337.1180341"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Smith, G., Alp\u00edzar, R.: Fast probabilistic simulation, nontermination, and secure information flow. In: Proc. 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, California, pp. 67\u201371 (June 2007)","DOI":"10.1145\/1255329.1255341"},{"key":"25_CR6","unstructured":"Bellare, M., Rogaway, P.: Introduction to modern cryptography (2005), http:\/\/www-cse.ucsd.edu\/users\/mihir\/cse207\/classnotes.html"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-77050-3_30","volume-title":"FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science","author":"J. Courant","year":"2007","unstructured":"Courant, J., Ene, C., Lakhnech, Y.: Computationally sound typing for non-interference: The case of deterministic encryption. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol.\u00a04855, pp. 364\u2013375. Springer, Heidelberg (2007)"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-45309-1_6","volume-title":"Programming Languages and Systems","author":"P. Laud","year":"2001","unstructured":"Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, vol.\u00a02028, pp. 77\u201391. Springer, Heidelberg (2001)"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-36575-3_12","volume-title":"Programming Languages and Systems","author":"P. Laud","year":"2003","unstructured":"Laud, P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, vol.\u00a02618, pp. 159\u2013173. Springer, Heidelberg (2003)"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/11537311_32","volume-title":"Fundamentals of Computation Theory","author":"P. Laud","year":"2005","unstructured":"Laud, P., Vene, V.: A type system for computationally secure information flow. In: Li\u015bkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol.\u00a03623, pp. 365\u2013377. Springer, Heidelberg (2005)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Askarov, A., Hedin, D., Sabelfeld, A.: Cryptographically-masked flows. In: Proceedings of the 13th International Static Analysis Symposium, Seoul, Korea, pp. 353\u2013369 (2006)","DOI":"10.1007\/11823230_23"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Laud, P.: On the computational soundness of cryptographically masked flows. In: Proceedings 35th Symposium on Principles of Programming Languages, San Francisco, California (January 2008)","DOI":"10.1145\/1328438.1328479"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Vaughan, J., Zdancewic, S.: A cryptographic decentralized label model. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 192\u2013206 (2007)","DOI":"10.1109\/SP.2007.5"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Fournet, C., Rezk, T.: Cryptographically sound implementations for typed information-flow security. In: Proceedings 35th Symposium on Principles of Programming Languages, San Francisco, California (January 2008)","DOI":"10.1145\/1328438.1328478"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Backes, M., Pfitzmann, B.: Relating symbolic and cryptographic secrecy. In: Proceeding 26th IEEE Symposium on Security and Privacy, Oakland, California (2005)","DOI":"10.1109\/SP.2005.17"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Laud, P.: Secrecy types for a simulatable cryptographic library. In: Proceedings 12th CCS (ACM Conference on Computer and Communications Security), pp. 26\u201335 (2005)","DOI":"10.1145\/1102120.1102126"},{"key":"25_CR17","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1968","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, 3rd edn., vol.\u00a0I. John Wiley & Sons, Inc., Chichester (1968)","edition":"3"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proceedings 13th IEEE Computer Security Foundations Workshop, Cambridge, UK, pp. 200\u2013214 (July 2000)","DOI":"10.1109\/CSFW.2000.856937"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Jonsson, B., Larsen, K.: Specification and refinement of probabilistic processes. In: Proc. 6th IEEE Symposium on Logic in Computer Science, pp. 266\u2013277 (1991)","DOI":"10.1109\/LICS.1991.151651"},{"issue":"2","key":"25_CR20","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.ic.2005.03.001","volume":"200","author":"C. Baier","year":"2005","unstructured":"Baier, C., Katoen, J.-P., Hermanns, H., Wolf, V.: Comparative branching-time semantics for Markov chains. Information and Computation\u00a0200(2), 149\u2013214 (2005)","journal-title":"Information and Computation"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate non-interference. In: Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 1\u201317 (June 2002)","DOI":"10.1109\/CSFW.2002.1021803"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science\u00a059(3) (2002)","DOI":"10.1016\/S1571-0661(04)00290-7"},{"issue":"2","key":"25_CR23","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1093\/logcom\/exi009","volume":"18","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation\u00a018(2), 181\u2013199 (2005)","journal-title":"Journal of Logic and Computation"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: Proceedings 34th Symposium on Principles of Programming Languages, Nice, France, pp. 225\u2013235 (January 2007)","DOI":"10.1145\/1190216.1190251"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proceedings 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia (2007)","DOI":"10.1145\/1315245.1315282"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Clarkson, M., Myers, A., Schneider, F.: Belief in information flow. In: Proceedings 18th IEEE Computer Security Foundations Workshop, Aix-en-Provence, France, pp. 31\u201345 (June 2005)","DOI":"10.1109\/CSFW.2005.10"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Quantifying information flow. In: Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 18\u201331 (June 2002)","DOI":"10.1109\/CSFW.2002.1021804"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation (to appear, 2008)","DOI":"10.1016\/j.ic.2007.07.003"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78663-4_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:17:51Z","timestamp":1619522271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78663-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540786627","9783540786634"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78663-4_25","relation":{},"subject":[]}}