Mário S. Alvim

According to our database1, Mário S. Alvim authored at least 31 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
An axiomatization of information flow measures.
Theor. Comput. Sci., 2019

A Probabilistic Algorithm to Predict Missing Facts from Knowledge Graphs.
Proceedings of the Database and Expert Systems Applications, 2019

2018
Information-Driven Rapidly-Exploring Random Tree for Efficient Environment Exploration.
Journal of Intelligent and Robotic Systems, 2018

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
Entropy, 2018

Leakage and Protocol Composition in a Game-Theoretic Perspective.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

An Algebraic Approach for Reasoning About Information Flow.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

A Comparative Study on Unsupervised Domain Adaptation for Coffee Crop Mapping.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2018

PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Proof-Carrying Sensing: Towards Real-World Authentication in Cyber-Physical Systems.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Formal Analysis of the Information Leakage of the DC-Nets and Crowds Anonymity Protocols.
Proceedings of the Formal Methods: Foundations and Applications - 20th Brazilian Symposium, 2017

Quantifying Vulnerability of Secret Generation Using Hyper-Distributions.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Modeling Information Flow in Dynamic Information Retrieval.
Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval, 2017

Information Leakage Games.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Axioms for Information Leakage.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Compression-Based Selective Sampling for Learning to Rank.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
On the information leakage of differentially-private mechanisms.
Journal of Computer Security, 2015

2014
Quantifying Information Flow for Dynamic Secrets.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

When Not All Bits Are Equal: Worth-Based Information Flow.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2012
Quantitative information flow in interactive systems.
Journal of Computer Security, 2012

Measuring Information Leakage Using Generalized Gain Functions.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications. (Des approches formelles pour le cachement d'information: Une analyse des systèmes interactifs, contrôle de divulgation statistique, et le raffinement des spécifications).
PhD thesis, 2011

Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

On the Relation between Differential Privacy and Quantitative Information Flow.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Quantitative Information Flow and Applications to Differential Privacy.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Probabilistic Information Flow.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

Safe Equivalences for Security Properties.
Proceedings of the Theoretical Computer Science, 2010

Entropy and Attack Models in Information Flow - (Invited Talk).
Proceedings of the Theoretical Computer Science, 2010

Interactive Information Flow - (Invited Talk).
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Information Flow in Interactive Systems.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010


  Loading...