Robustness

0Citations
Citations of this article
383Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Given a channel with input X, we have now seen that g-leakage provides us with a rich variety of ways to measure the information leakage of X that the channel causes. The prior models the adversary’s prior knowledge about X; the gain function g models the operational scenario, which encompasses both the set of actions that the adversary can take and also the worth to the adversary of each such action, for each possible value of X; and the choice of multiplicative- or additive leakage allows us to measure either the relative or the absolute increase in g-vulnerability.

Cite

CITATION STYLE

APA

Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., & Smith, G. (2020). Robustness. In Information Security and Cryptography (pp. 101–105). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-96131-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free