Measures and models of nicotine dependence: positive reinforcement

S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …

Measuring information leakage using generalized gain functions

SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …

Differential privacy: on the trade-off between utility and information leakage

MS Alvim, ME Andrés, K Chatzikokolakis… - Formal Aspects of …, 2012 - Springer
Differential privacy is a notion of privacy that has become very popular in the database
community. Roughly, the idea is that a randomized query mechanism provides sufficient …

Quantitative notions of leakage for one-try attacks

C Braun, K Chatzikokolakis, C Palamidessi - Electronic Notes in …, 2009 - Elsevier
Recent research in quantitative theories for information-hiding topics, such as Anonymity
and Secure Information Flow, tend to converge towards the idea of modeling the system as a …

Statistical measurement of information leakage

K Chatzikokolakis, T Chothia, A Guha - … on Tools and Algorithms for the …, 2010 - Springer
Abstract Information theory provides a range of useful methods to analyse probability
distributions and these techniques have been successfully applied to measure information …

Additive and multiplicative notions of leakage, and their capacities

MS Alvim, K Chatzikokolakis, A McIver… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …

Recent developments in quantitative information flow (invited tutorial)

G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …

Abstract channels and their robust information-leakage ordering

A McIver, C Morgan, G Smith, B Espinoza… - … 2014, Held as Part of the …, 2014 - Springer
The observable output of a probabilistic system that processes a secret input might reveal
some information about that input. The system can be modelled as an information-theoretic …

[HTML][HTML] Min-entropy as a resource

B Espinoza, G Smith - Information and Computation, 2013 - Elsevier
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking
some secret information. For this reason, it is useful to model secrecy quantitatively, thinking …

Quantifying information flow using min-entropy

G Smith - 2011 Eighth International Conference on Quantitative …, 2011 - ieeexplore.ieee.org
Quantitative theories of information flow are of growing interest, due to the fundamental
importance of protecting confidential information from improper disclosure, together with the …