• Aucun résultat trouvé

[PDF] Top 20 Quantitative Approaches to Information Hiding

Has 10000 "Quantitative Approaches to Information Hiding" found on our website. Below are the top 20 most common "Quantitative Approaches to Information Hiding".

Quantitative Approaches to Information Hiding

Quantitative Approaches to Information Hiding

... different approaches for quantifying information hiding in communication ...CCS to specify protocols and study their compositional safety, ...some information to the ...approach ... Voir le document complet

114

Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications

Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications

... to deliver the goods. The basi proto ol is fairly simple and is organized as a su ession of rounds of bidding. Round i starts with the seller announ ing the bid pri e b i for that round. Buyers have t se onds ... Voir le document complet

190

Self-organisation in cellular automata with coalescent particles: qualitative and quantitative approaches

Self-organisation in cellular automata with coalescent particles: qualitative and quantitative approaches

... AND QUANTITATIVE APPROACHES BENJAMIN HELLOUIN DE MENIBUS AND MATHIEU SABLIK ...tools to study self-organisation in a family of simple cellular automata which contain some particle-like objects with ... Voir le document complet

41

Data Hiding of Motion Information in Chroma and Luma Samples for Video Compression

Data Hiding of Motion Information in Chroma and Luma Samples for Video Compression

... is to hide informations in the non-zero DCT coefficients of a compressed video ...these approaches, the Force Even Water- marking (FEW) has been proposed in [5]: it hides information in the parity of ... Voir le document complet

6

QUANTITATIVE APPROACHES FOR THE STUDY OF MICROTUBULE ASTER MOTION IN LARGE EGGS

QUANTITATIVE APPROACHES FOR THE STUDY OF MICROTUBULE ASTER MOTION IN LARGE EGGS

... 2012). To precisely control daughter cell size and shape, cells may sense their shape to place the division plane ...serve to convert cell shape information to division plane ... Voir le document complet

23

Using or Hiding Private Information? An Experimental Study of Zero-Sum Repeated Games with Incomplete Information

Using or Hiding Private Information? An Experimental Study of Zero-Sum Repeated Games with Incomplete Information

... according to the amount of information the informed player should exploit: information should be fully used in the FR-games, partially used in the PR-games and disregarded in the ...according ... Voir le document complet

33

Markovian Processes for Quantitative Information Leakage

Markovian Processes for Quantitative Information Leakage

... the hiding algorithm in Fig. 4 . We will overload the symbol \ to use for the hiding operation: we write C \ T for the observable MC obtained from C by hiding the states in set T ...t ... Voir le document complet

155

Characterization of different pepper resistances to Potato virus Y through quantitative approaches to measure viral load

Characterization of different pepper resistances to Potato virus Y through quantitative approaches to measure viral load

... l'estimation quantitative de la présence d'un virus permet d'obtenir une information plus précise sur le niveau de résistance d'une ...résistance quantitative pour le piment (Tamisier et al, ... Voir le document complet

92

Quantitative Approaches for Assessing the Value of COTS-centric Development

Quantitative Approaches for Assessing the Value of COTS-centric Development

... analysis to this scenario requires an unreasonable assumption: that the decision to replace is made at time ...subject to uncertainty that can only be resolved through passage of time and that is at ... Voir le document complet

13

Developing Quantitative Molecular Analysis Approaches for Pharmaceuticals with LIBS using Chemometrics

Developing Quantitative Molecular Analysis Approaches for Pharmaceuticals with LIBS using Chemometrics

... PublicationsArchive-ArchivesPublications@nrc-cnrc.gc.ca. If you wish to email the authors directly, please see the first page of the publication for their contact information. ... Voir le document complet

4

Quantitative Information Flow for Scheduler-Dependent Systems

Quantitative Information Flow for Scheduler-Dependent Systems

... confidential information is an important goal in research of information secu- ...some information leakage is unavoidable in practice, the next step is to quantify and reduce the ...on ... Voir le document complet

18

On the relation between Differential Privacy and Quantitative Information Flow

On the relation between Differential Privacy and Quantitative Information Flow

... response to the problem of protect- ing the privacy of the database’s participants when performing statistical ...individual. Information flow is an area of Security concerned with the problem of ... Voir le document complet

18

Neural approaches to dialog modeling

Neural approaches to dialog modeling

... neural approaches for modeling ...are to perturbations in dialog history, where sensitivity is measured as a change in ...insensitive to dialog ...datasets to understand the kinds of ... Voir le document complet

130

Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach

Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach

... fingerprinting to distin- guish the users of the websites by checking the numerous properties of their machines and web ...way to protect the users’ pri- vacy is to make them switch between different ... Voir le document complet

17

Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols

Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols

... respect to the intended anonymous ...able to differentiate the agents quantitatively, namely to deduce that one agent is more likely (has higher prob- ability) to be the culprit than the ... Voir le document complet

159

The Cardinal Abstraction for Quantitative Information Flow

The Cardinal Abstraction for Quantitative Information Flow

... an information leak, namely two low equivalent memories that deliver different observable ...these approaches compute the maximum leakage by synthesising and enumerating the number of all such symbolic ... Voir le document complet

24

Quantitative Information Flow and Applications to Differential Privacy

Quantitative Information Flow and Applications to Differential Privacy

... vertex to be the culprit does not change after she observes the ...proposed to use concepts from information theory to model information flow and to define the leakage in a ... Voir le document complet

22

Compositional methods for information-hiding

Compositional methods for information-hiding

... of information flow there have been various works (McLean 1990, James ...high information and the low information are seen as the input and output respectively of a (noisy) ...channel. ... Voir le document complet

28

Enforcing Browser Anonymity with Quantitative Information Flow

Enforcing Browser Anonymity with Quantitative Information Flow

... fingerprinting to distinguish the users of the web- sites by checking the numerous properties of their machines and web ...way to protect the users’ privacy is to make them switch between different ... Voir le document complet

34

From qualitative to quantitative program analysis : permissive enforcement of secure information flow

From qualitative to quantitative program analysis : permissive enforcement of secure information flow

... these approaches is quantifying information flow ...implicit information flows due to programs testing if the value of a High variable is equal to a Low ...need to put the strain ... Voir le document complet

227

Show all 10000 documents...