In previous chapters we discussed how secrecy can be quantified: we described information measures that map a prior to a real number reflecting the amount of threat to which the secret is subjected; and we introduced g-vulnerabilities as a rich family of such information measures that can capture a variety of significant operational scenarios.
CITATION STYLE
Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., & Smith, G. (2020). Axiomatics. In Information Security and Cryptography (pp. 183–204). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-96131-6_11
Mendeley helps you to discover research relevant for your work.