Search

Your search keyword '"Information flow"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "Information flow" Remove constraint Descriptor: "Information flow" Publisher ios press Remove constraint Publisher: ios press
44 results on '"Information flow"'

Search Results

1. Improving Clinical Trials of Antioxidants in Alzheimer's Disease.

2. Reduced Prefrontal-Thalamic Theta Flow During Working Memory Retrieval in APP/PS1 Mice.

3. How efficient are replay attacks against vote privacy? A formal quantitative analysis1.

4. How efficient are replay attacks against vote privacy? A formal quantitative analysis1.

5. Effective connectivity analysis of brain networks of mathematically gifted adolescents using transfer entropy.

6. Studies on the Bottom-Up and Top-Down Neural Information Flow Alterations in Neurodegeneration.

7. Bucketing and information flow analysis for provable timing attack mitigation.

8. Fabric: Building open distributed systems securely by construction.

9. Paragon - Practical programming with information flow control.

10. On the expressiveness and semantics of information flow types

11. Model-checking trace-based information flow properties for infinite-state systems.

12. Information flow analysis for a dynamically typed language with staged metaprogramming.

13. Medication Information Flow in Home Care.

14. Information-flow security for JavaScript and its APIs.

15. Secure multi-execution: Fine-grained, declassification-aware, and transparent.

16. Differential Privacy and Security.

17. On the information leakage of differentially-private mechanisms.

18. Simulation Opacity.

19. Health Information Systems.

20. Information Flow Testing.

21. Information flow in trust management systems.

22. Required information release.

23. Informational Analysis of Security and Integrity.

24. Quantification of Positive and Negative Attacker's Information.

25. Strategic implications of RFID implementations in the retail industry supply chain.

26. Gained and Excluded Private Actions by Process Observations.

27. Process Algebra Contexts and Security Properties.

28. Hyperproperties.

29. The improved information environment as a key rationale for freedom of information reform in China.

30. Quantifying Security for Timed Process Algebras.

31. Declassification: Dimensions and principles.

32. On declassification and the non-disclosure policy.

33. Torbit: Design of an open source security flaw measurement suite.

34. Probabilistic Information Flow Security.

35. Observation Based System Security.

36. A static analysis for quantifying information flow in a simple imperative language.

37. Network Information Flow.

38. Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems.

39. Enforcing Robust Declassification and Qualified Robustness.

40. Information flow security in dynamic contexts.

41. Verifying information flow goals in Security‐Enhanced Linux.

42. Flow Graphs and Intelligent Data Analysis.

43. Discrimination of motor imagery tasks via information flow pattern of brain connectivity

44. Information flow security in dynamic contexts

Catalog

Books, media, physical & digital resources