{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:52:47Z","timestamp":1743151967451,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160738"},{"type":"electronic","value":"9783642160745"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16074-5_8","type":"book-chapter","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T10:11:51Z","timestamp":1286273511000},"page":"111-111","source":"Crossref","is-referenced-by-count":0,"title":["Interactive Information Flow"],"prefix":"10.1007","author":[{"given":"Catuscia","family":"Palamidessi","sequence":"first","affiliation":[]},{"given":"M\u00e1rio S.","family":"Alvim","sequence":"additional","affiliation":[]},{"given":"Miguel E.","family":"Andr\u00e9s","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Palamidessi, C., van Rossum, P., Smith, G.: Computing the leakage of information-hiding systems. In: Proc. of TACAS (2010) (to appear)","DOI":"10.1007\/978-3-642-12002-2_32"},{"issue":"2-4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.ic.2007.07.003","volume":"206","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Inf. and Comp.\u00a0206(2-4), 378\u2013401 (2008)","journal-title":"Inf. and Comp."},{"key":"8_CR3","series-title":"ENTCS","first-page":"149","volume-title":"Proc. of QAPL 2004","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. In: Proc. of QAPL 2004. ENTCS, vol.\u00a0112, pp. 149\u2013166. Elsevier, Amsterdam (2005)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Desharnais, J., Jagadeesan, R., Gupta, V., Panangaden, P.: The metric analogue of weak bisimulation for probabilistic processes. In: Proc. of LICS, pp. 413\u2013422 (2002)","DOI":"10.1109\/LICS.2002.1029849"},{"key":"8_CR5","first-page":"225","volume-title":"Proc. of POPL","author":"P. Malacaria","year":"2007","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: Proc. of POPL, pp. 225\u2013235. ACM, New York (2007)"},{"key":"8_CR6","unstructured":"James, M.: Causality, feedback and directed information. In: Proc. of the International Symposium on Information Theory and its Applications, Honolulu (1990)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G. Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/TIT.2008.2008147","volume":"55","author":"S. Tatikonda","year":"2009","unstructured":"Tatikonda, S., Mitter, S.K.: The capacity of channels with feedback. IEEE Transactions on Information Theory\u00a055(1), 323\u2013349 (2009)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16074-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T06:36:41Z","timestamp":1740551801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16074-5_8"}},"subtitle":["(Invited Talk)"],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160738","9783642160745"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16074-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}