• Aucun résultat trouvé

[PDF] Top 20 Axioms for Information Leakage

Has 10000 "Axioms for Information Leakage" found on our website. Below are the top 20 most common "Axioms for Information Leakage".

Axioms for Information Leakage

Axioms for Information Leakage

... Following Denning’s seminal work [24], Shannon-entropy has been widely used in the field of QIF for the leakage of confidential information [1], [25]–[30]. But as the field of QIF evolved, new ... Voir le document complet

17

Markovian Processes for Quantitative Information Leakage

Markovian Processes for Quantitative Information Leakage

... of information we have learned about X by observing Y ...Shannon leakage: when X is a secret and Y an observable then I(X; Y ) quantifies how many bits of X are learned by observing Y , and consequently ... Voir le document complet

155

Differential Privacy: on the trade-off between Utility and Information Leakage

Differential Privacy: on the trade-off between Utility and Information Leakage

... of information flow there is a similar concern for controlling information leakage, ...secret information from the ...the leakage in terms of min-entropy leakage, a ... Voir le document complet

31

Multi-level Access and Information Leakage in Scalable Cloud Storage

Multi-level Access and Information Leakage in Scalable Cloud Storage

... suited for future SSD-based cloud storage ...necessary for any singleton-bound achieving multi-level accessible ...useful for designing other codes in this ...the information leakage of ... Voir le document complet

3

Leakage Assessment through Neural Estimation of the Mutual Information

Leakage Assessment through Neural Estimation of the Mutual Information

... the information in the first layer, espe- cially the value of s, could be too condensed in the sense that only one neuron is used to describe ...the information provided by s about the cor- responding trace ... Voir le document complet

19

Microarchitecture-Aware Virtual Machine Placement under Information Leakage Constraints

Microarchitecture-Aware Virtual Machine Placement under Information Leakage Constraints

... the mitigation techniques against these attacks. Finally, we present existing metrics that quantify the quality of isolation. A. Microarchitectural components Since the last few years, the complexity of physical ma- ... Voir le document complet

9

Quantifying Leakage in the Presence of Unreliable Sources of Information

Quantifying Leakage in the Presence of Unreliable Sources of Information

... to cope with the presence of the attacker’s beliefs. To this end we propose a new metric based on the concept of vulnerability that takes into account the adversary’s beliefs. The idea is that the attacker does not know ... Voir le document complet

51

Interactive Realizability for Classical Peano Arithmetic with Skolem Axioms

Interactive Realizability for Classical Peano Arithmetic with Skolem Axioms

... algorithm for witness extraction is not at all the last word on the topic, for it is not particularly optimized for real-world ...important information that they have acquired during the ... Voir le document complet

28

Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization

Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization

... condition for side channels is the ability for the attacker to perform fine-grained measurements to distinguish between, ...account for legitimate uses of fine-grained ... Voir le document complet

144

Learning Class Disjointness Axioms Using Grammatical Evolution

Learning Class Disjointness Axioms Using Grammatical Evolution

... or axioms from a domain-specific ...opportunities for learning new knowl- edge in the context of an open ...practice for exposing, sharing, and connecting pieces of data, information, and ... Voir le document complet

17

Information Leakage of Non-Terminating Processes

Information Leakage of Non-Terminating Processes

... Finite Leakage The Markov chain semantics of the system describes the joint behavior of all ...compute information leakage we are only interested in the secret and the observable variables, so we can ... Voir le document complet

17

Neural Network Information Leakage through Hidden Learning

Neural Network Information Leakage through Hidden Learning

... Figure 2: In green, a representation of the LeNet-like architecture for the official network, described in Section 4, applied to a classification into m classes. In red, the architecture the multilayer perceptron ... Voir le document complet

10

Quantifying Information Leakage of Randomized Protocols

Quantifying Information Leakage of Randomized Protocols

... less information than B under many different leakage measures, including Shannon leakage, guessing entropy and min-entropy leakage [ 1 , 22 ...but for information theoretical ... Voir le document complet

43

Information Leakage by Trace Analysis in QUAIL

Information Leakage by Trace Analysis in QUAIL

... Information Leakage by Trace Analysis in QUAIL Fabrizio Biondi 1 , Jean Quilbeuf 1 , and Axel Legay 1 Inria Abstract. Quantitative security techniques have been proven effective to measure the security of ... Voir le document complet

18

Evidence of an information leakage between logically independent blocks

Evidence of an information leakage between logically independent blocks

... glitches has been studied in [17]. The countermeasure implemen- tation has to be close enough to the AES ’s implementation to be efficient against electromagnetic injection. For sake of clarity, only clock ... Voir le document complet

7

On the information leakage of differentially-private mechanisms

On the information leakage of differentially-private mechanisms

... quantitative information flow, in particular conditional min-entropy H ∞ and min-entropy leakage I ∞ ...on leakage, on the other hand, such as Theorem 15, make no such ...way leakage is ... Voir le document complet

46

Testing OWL Axioms against RDF Facts: A Possibilistic Approach

Testing OWL Axioms against RDF Facts: A Possibilistic Approach

... Keywords: ontology learning, open-world assumption, possibility the- ory 1 Introduction A common approach to the semantic Web puts strong emphasis on a principled conceptual analysis of a domain of interest leading to ... Voir le document complet

13

Possibilistic testing of OWL axioms against RDF data

Possibilistic testing of OWL axioms against RDF data

... 2 axioms 130 into corresponding first-order logic formulas which will serve as a basis to query an RDF dataset in order to test OWL 2 candidate axioms against ... Voir le document complet

41

Frame-validity games and absolute minimality of modal axioms

Frame-validity games and absolute minimality of modal axioms

... The power of first-order logic and some of its extensions to succinctly define graph properties has been investigated extensively [7], as that of the modal language and natural extensions to define properties of ... Voir le document complet

21

Evaluation of arguments from support relations: Axioms and Semantics

Evaluation of arguments from support relations: Axioms and Semantics

... The second semantics, called reward-based semantics, favours the number of supporters over their quality. Its basic idea is the following: an argument receives a reward for each of its supporters. The greater the ... Voir le document complet

8

Show all 10000 documents...