In this survey paper we consider the class of protocols for information-hiding which use randomization to obfuscate the link between the observables and the information to be protected. We focus on the problem of formalizing the notion of information hiding, and verifying that a given protocol achieves the intended degree of protection. Without the pretense of being omni-comprehensive, we review the main approaches that have been explored in literature: possibilistic, probabilistic, information-theoretic, and statistical
International audienceThe quantification of information leakage provides a quantitative evaluation o...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceWe address the problem of computing the information leakage of a system in an ...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
International audienceIn this survey paper we consider the class of protocols for information-hiding...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
In this thesis, we considered different approaches for quantifying information hiding in communicati...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceWe address the problem of computing the information leakage of a system in an ...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
International audienceIn this survey paper we consider the class of protocols for information-hiding...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
In this thesis, we considered different approaches for quantifying information hiding in communicati...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceWe address the problem of computing the information leakage of a system in an ...