<--- Back to Details
First PageDocument Content
Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport
Date: 2017-06-07 20:45:26
Information theory
Cryptography
Information
Electrical engineering
Information flow
Information leakage
Leak
Entropy
Weka
Memory leak
Mutual information
Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Download Document from Source Website

File Size: 230,90 KB

Share Document on Facebook

Similar Documents

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

DocID: 1xUs3 - View Document

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

DocID: 1xU7T - View Document

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

DocID: 1xTSC - View Document

Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

DocID: 1xTox - View Document

Faster Two-Bit Pattern Analysis of Leakage Ziyuan Meng and Geoffrey Smith School of Computing and Information Sciences Florida International University, Miami, FL 33199, USA ,

Faster Two-Bit Pattern Analysis of Leakage Ziyuan Meng and Geoffrey Smith School of Computing and Information Sciences Florida International University, Miami, FL 33199, USA ,

DocID: 1v8NP - View Document