Abstract: In computer security, it is frequently necessary in practice to accept some leakage of confidential information. This motivates the development of theories of Quantitative Information Flow ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results