共 32 条
- [1] [Anonymous], 2006, Elements of Information Theory
- [2] [Anonymous], P 14 ACM C COMP COMM
- [3] Boreale M., 2011, P ESORICS 11
- [4] Boreale M, 2006, LECT NOTES COMPUT SC, V4052, P119
- [5] Boreale M, 2011, LECT NOTES COMPUT SC, V6604, P396, DOI 10.1007/978-3-642-19805-2_27
- [7] On the Bayes risk in information-hiding protocols [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (05) : 531 - 571
- [8] Anonymity protocols as noisy channels [J]. INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 378 - 401
- [9] Clark D., 2001, WORKSHOP QUANTITATIV, V59, P238
- [10] Quantification of Integrity [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 28 - 43