A sound type system for secure flow analysis D Volpano, C Irvine, G Smith Journal of computer security 4 (2-3), 167-187, 1996 | 1505 | 1996 |
On the foundations of quantitative information flow G Smith International Conference on Foundations of Software Science and …, 2009 | 689 | 2009 |
Secure information flow in a multi-threaded imperative language G Smith, D Volpano Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998 | 616 | 1998 |
A type-based approach to program security D Volpano, G Smith TAPSOFT'97: Theory and Practice of Software Development: 7th International …, 1997 | 392 | 1997 |
Measuring Information Leakage using Generalized Gain Functions MS Alvim, K Chatzikokolakis, C Palamidessi, G Smith 2012 IEEE 25th Computer Security Foundations Symposium, 265-279, 2012 | 291 | 2012 |
Probabilistic noninterference in a concurrent language D Volpano, G Smith Journal of Computer Security 7 (2-3), 231-253, 1999 | 266 | 1999 |
Eliminating covert flows with minimum typings D Volpano, G Smith Proceedings 10th Computer Security Foundations Workshop, 156-168, 1997 | 224 | 1997 |
A New Type System for Secure Information Flow. G Smith CSFW 1, 4, 2001 | 186 | 2001 |
Principles of secure information flow analysis G Smith Malware Detection, 291-307, 2007 | 127 | 2007 |
Verifying secrets and relative secrecy D Volpano, G Smith Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000 | 121 | 2000 |
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks B Köpf, G Smith 2010 23rd IEEE Computer Security Foundations Symposium, 44-56, 2010 | 113 | 2010 |
Principal type schemes for functional programs with overloading and subtyping GS Smith Science of Computer Programming 23 (2-3), 197-226, 1994 | 100 | 1994 |
Additive and multiplicative notions of leakage, and their capacities MS Alvim, K Chatzikokolakis, A McIver, C Morgan, C Palamidessi, ... 2014 IEEE 27th Computer Security Foundations Symposium, 308-322, 2014 | 98 | 2014 |
Quantifying information flow using min-entropy G Smith 2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011 | 87 | 2011 |
Probabilistic noninterference through weak probabilistic bisimulation G Smith 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 3-13, 2003 | 83 | 2003 |
Abstract channels and their robust information-leakage ordering A McIver, C Morgan, G Smith, B Espinoza, L Meinicke Principles of Security and Trust: Third International Conference, POST 2014 …, 2014 | 81 | 2014 |
Min-entropy as a resource B Espinoza, G Smith Information and Computation 226, 57-75, 2013 | 77 | 2013 |
The Science of Quantitative Information Flow MS Alvim, K Chatzikokolakis, A McIver, C Morgan, C Palamidessi, ... Springer International Publishing, 2020 | 66 | 2020 |
Polymorphic type inference for languages with overloading and subtyping GS Smith Cornell University, 1991 | 65 | 1991 |
Managing security policies in a distributed environment using extensible markup language (XML) NN Vuong, GS Smith, Y Deng Proceedings of the 2001 ACM symposium on Applied computing, 405-411, 2001 | 62 | 2001 |