AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary from inferring secret information from the observables. Anonymity and Information Flow are examples of this notion. We study the problem of information hiding in systems characterized by the coexistence of randomization and concurrency. It is well known that the presence of nondeterminism, due to the possible interleavings and interactions of the parallel components, can cause unintended information leaks. The most established approach to solve this problem is to fix the strategy of the scheduler beforehand. In this work, we propose a milder restriction on the schedulers, and we define the notion of strong (probabilistic) information hiding u...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
International audienceWhen dealing with process calculi and automata which express both nondetermini...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceQuantitative information flow analyses measure how much information on secrets...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
AbstractWhen dealing with process calculi and automata which express both nondeterministic and proba...
The work presented in this document in an account of my work as a PhD student at LIX, Ecole Polytech...
International audienceWe address the problem of computing the information leakage of a system in an ...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
International audienceWhen dealing with process calculi and automata which express both nondetermini...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceQuantitative information flow analyses measure how much information on secrets...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
AbstractWhen dealing with process calculi and automata which express both nondeterministic and proba...
The work presented in this document in an account of my work as a PhD student at LIX, Ecole Polytech...
International audienceWe address the problem of computing the information leakage of a system in an ...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
International audienceWhen dealing with process calculi and automata which express both nondetermini...
We present and compare definitions of the notion of "statisticallyhiding" protocols, and we propose ...