共 64 条
[11]
3D Augmented Reality Tangible User Interface using Commodity Hardware
[J].
PROCEEDINGS OF THE 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS, VOL 1: GRAPP,
2020,
:384-391
[12]
Probability of error in information-hiding protocols
[J].
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS,
2007,
:341-+
[13]
Chatzikokolakis K, 2010, LECT NOTES COMPUT SC, V6015, P390, DOI 10.1007/978-3-642-12002-2_33
[14]
F-BLEAU: Fast Black-box Leakage Estimation
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:835-852
[15]
Quantification of integrity
[J].
MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE,
2015, 25 (02)
:207-258
[16]
Quantifying information flow with beliefs
[J].
JOURNAL OF COMPUTER SECURITY,
2009, 17 (05)
:655-701
[17]
Czyz P, 2023, Arxiv, DOI [arXiv:2306.11078, DOI 10.48550/ARXIV.2306.11078]
[18]
Desfontaines Damien, 2020, Proceedings on Privacy Enhancing Technologies, V2020, P288, DOI 10.2478/popets-2020-0028
[19]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[20]
Fano RM., 1961, AM J PHYS, V29, P793, DOI [10.1119/1.1937609, DOI 10.1119/1.1937609]