We begin our detailed study of quantitative information flow by asking ourselves what a secret really is. There are many non-controversial examples, such as a user’s password, social security number, or current location — but what does it mean for us to treat them as secrets?
CITATION STYLE
Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., & Smith, G. (2020). Modeling secrets. In Information Security and Cryptography (pp. 17–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-96131-6_2
Mendeley helps you to discover research relevant for your work.