Geoffrey Smith

According to our database1, Geoffrey Smith authored at least 48 papers between 1991 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Tight Bounds on Information Leakage from Repeated Independent Runs.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Correlated Secrets in Quantitative Information Flow.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Axioms for Information Leakage.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Preface to the special issue on quantitative information flow.
Mathematical Structures in Computer Science, 2015

Recent Developments in Quantitative Information Flow (Invited Tutorial).
Proceedings of the 30th Annual ACM/IEEE Symposium on Logic in Computer Science, 2015

2014
Abstract Channels and Their Robust Information-Leakage Ordering.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Min-entropy as a resource.
Inf. Comput., 2013

2012
Measuring Information Leakage Using Generalized Gain Functions.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Non-termination and secure information flow.
Mathematical Structures in Computer Science, 2011

Quantifying Information Flow Using Min-Entropy.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Calculating bounds on information leakage using two-bit patterns.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

Min-Entropy Leakage of Channels in Cascade.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

2010
Computing the Leakage of Information-Hiding Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Secure Information Flow for Distributed Systems.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

On the Foundations of Quantitative Information Flow.
Proceedings of the Foundations of Software Science and Computational Structures, 2009

2008
Anatomy of a Real-Time Intrusion Prevention System.
Proceedings of the 2008 International Conference on Autonomic Computing, 2008

2007
Principles of Secure Information Flow Analysis.
Proceedings of the Malware Detection, 2007

Adversaries and Information Leaks (Tutorial).
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Fast probabilistic simulation, nontermination, and secure information flow.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

2006
Improved typings for probabilistic noninterference in a multi-threaded language.
Journal of Computer Security, 2006

Secure information flow with random assignment and encryption.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

Inductive bases and their application to searches for minimal unary NFAs.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

Type inference and informative error reporting for secure information flow.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2004
Lenient Array Operations for Practical Secure Information Flow.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Probabilistic Noninterference through Weak Probabilistic Bisimulation.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2001
Managing security policies in a distributed environment using eXtensible markup language (XML).
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

A New Type System for Secure Information Flow.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Basic research in information privacy.
ACM SIGSOFT Software Engineering Notes, 2000

Verifying Secrets and Relative Secrecy.
Proceedings of the POPL 2000, 2000

1999
Probabilistic Noninterference in a Concurrent Language.
Journal of Computer Security, 1999

Confinement Properties for Multi-Threaded Programs.
Electr. Notes Theor. Comput. Sci., 1999

1998
Confinement properties for programming languages.
SIGACT News, 1998

A Sound Polymorphic Type System for a Dialect of C.
Sci. Comput. Program., 1998

Secure Information Flow in a Multi-Threaded Imperative Language.
Proceedings of the POPL '98, 1998

Language Issues in Mobile Program Security.
Proceedings of the Mobile Agents and Security, 1998

Probabilistic Noninterference in a Concurrent Language.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
A Type-Based Approach to Program Security.
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997

Eliminating Covert Flows with Minimum Typings.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
Polymorphic typing of Variables and References.
ACM Trans. Program. Lang. Syst., 1996

A Sound Type System for Secure Flow Analysis.
Journal of Computer Security, 1996

On the Systematic Design of Web Languages.
ACM Comput. Surv., 1996

Towards an ML-Style Polymorphic Type System for C.
Proceedings of the Programming Languages and Systems, 1996

1995
A Type Soundness Proof for Variables in LCF ML.
Inf. Process. Lett., 1995

1994
Principal Type Schemes for Functional Programs with Overloading and Subtyping.
Sci. Comput. Program., 1994

1993
Polymorphic Type Inference with Overloading and Subtyping.
Proceedings of the TAPSOFT'93: Theory and Practice of Software Development, 1993

1991
On the Complexity of ML Typability with Overloading.
Proceedings of the Functional Programming Languages and Computer Architecture, 1991


  Loading...