Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Malacaria, Pasquale
and
Smeraldi, Fabrizio
2013.
Thermodynamic aspects of confidentiality.
Information and Computation,
Vol. 226,
Issue. ,
p.
76.
Huang, Xujing
2015.
It Leaks More Than You Think: Fingerprinting Users from Web Traffic Analysis.
Acta Informatica Pragensia,
Vol. 4,
Issue. 3,
p.
206.
Pasareanu, Corina S.
Phan, Quoc-Sang
and
Malacaria, Pasquale
2016.
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT.
p.
387.
Biondi, Fabrizio
and
Legay, Axel
2016.
Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques.
Vol. 9952,
Issue. ,
p.
883.
Khouzani, M.H.R.
and
Malacaria, Pasquale
2016.
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design.
p.
61.
Ah-Fat, Patrick
and
Huth, Michael
2017.
Principles of Security and Trust.
Vol. 10204,
Issue. ,
p.
71.
Borges, Mateus
Phan, Quoc-Sang
Filieri, Antonio
and
Păsăreanu, Corina S.
2017.
NASA Formal Methods.
Vol. 10227,
Issue. ,
p.
131.
Phan, Quoc-Sang
Bang, Lucas
Pasareanu, Corina S.
Malacaria, Pasquale
and
Bultan, Tevfik
2017.
Synthesis of Adaptive Side-Channel Attacks.
p.
328.
Malacaria, Pasquale
Khouzani, MHR
Pasareanu, Corina S.
Phan, Quoc-Sang
and
Luckow, Kasper
2018.
Symbolic Side-Channel Analysis for Probabilistic Programs.
p.
313.
Ah-Fat, Patrick
and
Huth, Michael
2019.
Scalable Information Flow Analysis of Secure Three-Party Affine Computations.
p.
2967.
Ah-Fat, Patrick
and
Huth, Michael
2019.
Optimal Accuracy-Privacy Trade-Off for Secure Computations.
IEEE Transactions on Information Theory,
Vol. 65,
Issue. 5,
p.
3165.
McIver, A.K.
Morgan, C.C.
and
Rabehaja, T.
2019.
Program algebra for quantitative information flow.
Journal of Logical and Algebraic Methods in Programming,
Vol. 106,
Issue. ,
p.
55.
Chatzikokolakis, Konstantinos
Fernandes, Natasha
and
Palamidessi, Catuscia
2019.
Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy.
p.
442.
Terauchi, Tachio
and
Antonopoulos, Timos
2019.
Principles of Security and Trust.
Vol. 11426,
Issue. ,
p.
29.
Ah-Fat, Patrick
and
Huth, Michael
2020.
Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations.
Proceedings on Privacy Enhancing Technologies,
Vol. 2020,
Issue. 3,
p.
284.
Terauchi, Tachio
and
Antonopoulos, Timos
2020.
Bucketing and information flow analysis for provable timing attack mitigation.
Journal of Computer Security,
Vol. 28,
Issue. 6,
p.
607.
Chatzikokolakis, Konstantinos
Fernandes, Natasha
and
Palamidessi, Catuscia
2020.
Refinement Orders for Quantitative Information Flow and Differential Privacy.
Journal of Cybersecurity and Privacy,
Vol. 1,
Issue. 1,
p.
40.
Américo, Arthur
and
Malacaria, Pasquale
2021.
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures.
p.
1.
Américo, Arthur
Khouzani, MHR
and
Malacaria, Pasquale
2021.
Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization.
Entropy,
Vol. 24,
Issue. 1,
p.
39.
Hunt, Sebastian
Sands, David
and
Stucki, Sandro
2023.
Reconciling Shannon and Scott with a Lattice of Computable Information.
Proceedings of the ACM on Programming Languages,
Vol. 7,
Issue. POPL,
p.
1987.