Information leakage

Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems. A key insight… (More)
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative information flow. In g-leakage… (More)
Is this relevant?
Highly Cited
2012
Highly Cited
2012
With the growing popularity of Android platform, Android application market becomes a major distribution center where Android… (More)
  • figure 1
  • table I
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Suppose that a Facebook user, whose age is hidden or missing, likes Britney Spears. Can you guess his/her age? Knowing that most… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
A rechargeable battery may be used to partially protect the privacy of information contained in a household's electrical load… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In 1999, Juels and Wattenberg introduced the fuzzy commitment scheme. This scheme is a particular realization of a binary… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft's Azure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Framing effects are said to occur when equivalent frames lead to different choices. However, the equivalence in question has been… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?