Geoffrey Smith
Geoffrey Smith
School of Computing and Information Sciences, Florida International University
Verified email at - Homepage
Cited by
Cited by
A sound type system for secure flow analysis
D Volpano, C Irvine, G Smith
Journal of computer security 4 (2-3), 167-187, 1996
Secure information flow in a multi-threaded imperative language
G Smith, D Volpano
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
On the foundations of quantitative information flow
G Smith
International Conference on Foundations of Software Science and …, 2009
A type-based approach to program security
D Volpano, G Smith
Colloquium on Trees in Algebra and Programming, 607-621, 1997
Probabilistic noninterference in a concurrent language
D Volpano, G Smith
Journal of Computer Security 7 (2-3), 231-253, 1999
Probabilistic noninterference in a concurrent language
D Volpano, G Smith
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE, 34-43, 1998
Measuring Information Leakage using Generalized Gain Functions
MS Alvim, K Chatzikokolakis, C Palamidessi, G Smith
2012 IEEE 25th Computer Security Foundations Symposium, 265-279, 2012
Eliminating covert flows with minimum typings
D Volpano, G Smith
Proceedings 10th Computer Security Foundations Workshop, 156-168, 1997
A New Type System for Secure Information Flow.
G Smith
CSFW 1, 4, 2001
Verifying secrets and relative secrecy
D Volpano, G Smith
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000
Principles of secure information flow analysis
G Smith
Malware Detection, 291-307, 2007
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
2010 23rd IEEE Computer Security Foundations Symposium, 44-56, 2010
Principal type schemes for functional programs with overloading and subtyping
GS Smith
Science of Computer Programming 23 (2-3), 197-226, 1994
Quantifying information flow using min-entropy
G Smith
2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011
Additive and multiplicative notions of leakage, and their capacities
MS Alvim, K Chatzikokolakis, A McIver, C Morgan, C Palamidessi, ...
2014 IEEE 27th Computer Security Foundations Symposium, 308-322, 2014
Probabilistic noninterference through weak probabilistic bisimulation
G Smith
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 3-13, 2003
Abstract channels and their robust information-leakage ordering
A McIver, C Morgan, G Smith, B Espinoza, L Meinicke
International Conference on Principles of Security and Trust, 83-102, 2014
Language issues in mobile program security
D Volpano, G Smith
Mobile Agents and Security, 25-43, 1998
Managing security policies in a distributed environment using extensible markup language (XML)
NN Vuong, GS Smith, Y Deng
Proceedings of the 2001 ACM symposium on Applied computing, 405-411, 2001
Min-entropy as a resource
B Espinoza, G Smith
Information and Computation 226, 57-75, 2013
The system can't perform the operation now. Try again later.
Articles 1–20