Measures and models of nicotine dependence: positive reinforcement
S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …
to develop theory‐led suggestions for measures that will be relevant in the early phases of …
Measuring information leakage using generalized gain functions
SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …
Differential privacy: on the trade-off between utility and information leakage
Differential privacy is a notion of privacy that has become very popular in the database
community. Roughly, the idea is that a randomized query mechanism provides sufficient …
community. Roughly, the idea is that a randomized query mechanism provides sufficient …
Quantitative notions of leakage for one-try attacks
C Braun, K Chatzikokolakis, C Palamidessi - Electronic Notes in …, 2009 - Elsevier
Recent research in quantitative theories for information-hiding topics, such as Anonymity
and Secure Information Flow, tend to converge towards the idea of modeling the system as a …
and Secure Information Flow, tend to converge towards the idea of modeling the system as a …
Statistical measurement of information leakage
Abstract Information theory provides a range of useful methods to analyse probability
distributions and these techniques have been successfully applied to measure information …
distributions and these techniques have been successfully applied to measure information …
Additive and multiplicative notions of leakage, and their capacities
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
Recent developments in quantitative information flow (invited tutorial)
G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …
confidential information. This motivates the development of theories of Quantitative …
Abstract channels and their robust information-leakage ordering
The observable output of a probabilistic system that processes a secret input might reveal
some information about that input. The system can be modelled as an information-theoretic …
some information about that input. The system can be modelled as an information-theoretic …
[HTML][HTML] Min-entropy as a resource
B Espinoza, G Smith - Information and Computation, 2013 - Elsevier
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking
some secret information. For this reason, it is useful to model secrecy quantitatively, thinking …
some secret information. For this reason, it is useful to model secrecy quantitatively, thinking …
Quantifying information flow using min-entropy
G Smith - 2011 Eighth International Conference on Quantitative …, 2011 - ieeexplore.ieee.org
Quantitative theories of information flow are of growing interest, due to the fundamental
importance of protecting confidential information from improper disclosure, together with the …
importance of protecting confidential information from improper disclosure, together with the …