{"id":"https://openalex.org/W1589478560","doi":"https://doi.org/10.2168/lmcs-11(4:5)2015","title":"Quantitative information flow under generic leakage functions and adaptive adversaries","display_name":"Quantitative information flow under generic leakage functions and adaptive adversaries","publication_year":2015,"publication_date":"2015-11-10","ids":{"openalex":"https://openalex.org/W1589478560","doi":"https://doi.org/10.2168/lmcs-11(4:5)2015","mag":"1589478560"},"language":"en","primary_location":{"id":"doi:10.2168/lmcs-11(4:5)2015","is_oa":true,"landing_page_url":"https://doi.org/10.2168/lmcs-11(4:5)2015","pdf_url":"https://lmcs.episciences.org/1606/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://lmcs.episciences.org/1606/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078624552","display_name":"Michele Boreale","orcid":"https://orcid.org/0000-0002-1972-7491"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"M. Boreale","raw_affiliation_strings":["university of Florence"],"affiliations":[{"raw_affiliation_string":"university of Florence","institution_ids":["https://openalex.org/I45084792"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043113239","display_name":"Francesca Pampaloni","orcid":null},"institutions":[{"id":"https://openalex.org/I127077003","display_name":"IMT School for Advanced Studies Lucca","ror":"https://ror.org/035gh3a49","country_code":"IT","type":"education","lineage":["https://openalex.org/I127077003"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesca Pampaloni","raw_affiliation_strings":["IMT, Lucca"],"affiliations":[{"raw_affiliation_string":"IMT, Lucca","institution_ids":["https://openalex.org/I127077003"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078624552"],"corresponding_institution_ids":["https://openalex.org/I45084792"],"apc_list":null,"apc_paid":null,"fwci":4.4624,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.94715519,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"Volume 11, Issue 4","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6760370135307312},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6610716581344604},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6532847881317139},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5340790748596191},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.5258391499519348},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4847845435142517},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4589686095714569},{"id":"https://openalex.org/keywords/time-horizon","display_name":"Time horizon","score":0.4220256209373474},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2395814061164856}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6760370135307312},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6610716581344604},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6532847881317139},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5340790748596191},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.5258391499519348},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4847845435142517},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4589686095714569},{"id":"https://openalex.org/C28761237","wikidata":"https://www.wikidata.org/wiki/Q7805321","display_name":"Time horizon","level":2,"score":0.4220256209373474},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2395814061164856},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.2168/lmcs-11(4:5)2015","is_oa":true,"landing_page_url":"https://doi.org/10.2168/lmcs-11(4:5)2015","pdf_url":"https://lmcs.episciences.org/1606/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1507.05766","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1507.05766","pdf_url":"https://arxiv.org/pdf/1507.05766","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:flore.unifi.it:2158/1013459","is_oa":true,"landing_page_url":"http://hdl.handle.net/2158/1013459","pdf_url":"http://arxiv.org/abs/1507.05766","source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:a027c1ca71104489a3ea49a71065cf8b","is_oa":true,"landing_page_url":"https://doaj.org/article/a027c1ca71104489a3ea49a71065cf8b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Logical Methods in Computer Science, Vol Volume 11, Issue 4 (2015)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2168/lmcs-11(4:5)2015","is_oa":true,"landing_page_url":"https://doi.org/10.2168/lmcs-11(4:5)2015","pdf_url":"https://lmcs.episciences.org/1606/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1589478560.pdf","grobid_xml":"https://content.openalex.org/works/W1589478560.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W182286721","https://openalex.org/W1585787666","https://openalex.org/W1589478560","https://openalex.org/W1738504611","https://openalex.org/W1795786057","https://openalex.org/W1831680499","https://openalex.org/W1873763122","https://openalex.org/W1890449996","https://openalex.org/W1982065519","https://openalex.org/W1986761379","https://openalex.org/W1987983106","https://openalex.org/W2000015806","https://openalex.org/W2006258746","https://openalex.org/W2025076043","https://openalex.org/W2040291007","https://openalex.org/W2050869006","https://openalex.org/W2085977348","https://openalex.org/W2097151854","https://openalex.org/W2103759928","https://openalex.org/W2106289417","https://openalex.org/W2111145992","https://openalex.org/W2115109072","https://openalex.org/W2116660249","https://openalex.org/W2119966192","https://openalex.org/W2167136065","https://openalex.org/W2296319761","https://openalex.org/W2478708596","https://openalex.org/W2808734364","https://openalex.org/W4252475223"],"related_works":["https://openalex.org/W3123987581","https://openalex.org/W2358406440","https://openalex.org/W2106969392","https://openalex.org/W2352435628","https://openalex.org/W1595551935","https://openalex.org/W2360781613","https://openalex.org/W2157160400","https://openalex.org/W2138926267","https://openalex.org/W3175365978","https://openalex.org/W1646148796"],"abstract_inverted_index":{"We":[0],"put":[1],"forward":[2],"a":[3,112,122],"model":[4,25],"of":[5,28,70,87,98,121],"action-based":[6],"randomization":[7],"mechanisms":[8],"to":[9,56,90,129,138],"analyse":[10],"quantitative":[11],"information":[12,107],"flow":[13],"(QIF)":[14],"under":[15,20,51],"generic":[16],"leakage":[17,49,108],"functions,":[18],"and":[19,59,72],"possibly":[21],"adaptive":[22,63,71],"adversaries.":[23],"This":[24,125],"subsumes":[26],"many":[27],"the":[29,39,48,68,77,83,96,105],"QIF":[30],"models":[31],"proposed":[32],"so":[33],"far.":[34],"Our":[35],"main":[36],"contributions":[37],"include":[38],"following:":[40],"(1)":[41],"we":[42,66,102],"identify":[43],"mild":[44],"general":[45,58],"conditions":[46],"on":[47,62],"function":[50],"which":[52],"it":[53],"is":[54],"possible":[55],"derive":[57],"significant":[60],"results":[61],"QIF;":[64],"(2)":[65],"contrast":[67],"efficiency":[69],"non-adaptive":[73],"strategies,":[74,110],"showing":[75],"that":[76,104],"latter":[78],"are":[79],"as":[80,82],"efficient":[81],"former":[84],"in":[85,119],"terms":[86,120],"length":[88],"up":[89],"an":[91,131],"expansion":[92],"factor":[93],"bounded":[94],"by":[95,136],"number":[97],"available":[99],"actions;":[100],"(3)":[101],"show":[103],"maximum":[106],"over":[109],"given":[111],"finite":[113,133],"time":[114],"horizon,":[115],"can":[116,126],"be":[117,127],"expressed":[118],"Bellman":[123],"equation.":[124],"used":[128],"compute":[130],"optimal":[132],"strategy":[134],"recursively,":[135],"resorting":[137],"standard":[139],"methods":[140],"like":[141],"backward":[142],"induction.":[143]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3}],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2016-06-24T00:00:00"}
