Filter your results
- 3
- 3
- 3
- 1
- 1
- 1
- 3
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Worst- and Average-Case Privacy Breaches in Randomization Mechanisms7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.72-86, ⟨10.1007/978-3-642-33475-7_6⟩
Conference papers
hal-01556211v1
|
||
|
Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.166-181, ⟨10.1007/978-3-662-43613-4_11⟩
Conference papers
hal-01398015v1
|
||
|
Reasoning About Distributed Secrets37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.156-170, ⟨10.1007/978-3-319-60225-7_11⟩
Conference papers
hal-01658413v1
|