Follow
Geoffrey Smith
Geoffrey Smith
School of Computing and Information Sciences, Florida International University
Verified email at cis.fiu.edu - Homepage
Title
Cited by
Cited by
Year
A sound type system for secure flow analysis
D Volpano, C Irvine, G Smith
Journal of computer security 4 (2-3), 167-187, 1996
14921996
On the foundations of quantitative information flow
G Smith
International Conference on Foundations of Software Science and …, 2009
6752009
Secure information flow in a multi-threaded imperative language
G Smith, D Volpano
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
6081998
A type-based approach to program security
D Volpano, G Smith
TAPSOFT'97: Theory and Practice of Software Development: 7th International …, 1997
3961997
Measuring Information Leakage using Generalized Gain Functions
MS Alvim, K Chatzikokolakis, C Palamidessi, G Smith
2012 IEEE 25th Computer Security Foundations Symposium, 265-279, 2012
2792012
Probabilistic noninterference in a concurrent language
D Volpano, G Smith
Journal of Computer Security 7 (2-3), 231-253, 1999
2601999
Eliminating covert flows with minimum typings
D Volpano, G Smith
Proceedings 10th Computer Security Foundations Workshop, 156-168, 1997
2231997
A New Type System for Secure Information Flow.
G Smith
CSFW 1, 4, 2001
1862001
Principles of secure information flow analysis
G Smith
Malware Detection, 291-307, 2007
1242007
Verifying secrets and relative secrecy
D Volpano, G Smith
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000
1212000
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
2010 23rd IEEE Computer Security Foundations Symposium, 44-56, 2010
1122010
Principal type schemes for functional programs with overloading and subtyping
GS Smith
Science of Computer Programming 23 (2-3), 197-226, 1994
1011994
Additive and multiplicative notions of leakage, and their capacities
MS Alvim, K Chatzikokolakis, A McIver, C Morgan, C Palamidessi, ...
2014 IEEE 27th Computer Security Foundations Symposium, 308-322, 2014
932014
Quantifying information flow using min-entropy
G Smith
2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011
842011
Probabilistic noninterference through weak probabilistic bisimulation
G Smith
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 3-13, 2003
822003
Abstract channels and their robust information-leakage ordering
A McIver, C Morgan, G Smith, B Espinoza, L Meinicke
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
812014
Min-entropy as a resource
B Espinoza, G Smith
Information and Computation 226, 57-75, 2013
722013
Polymorphic type inference for languages with overloading and subtyping
GS Smith
Cornell University, 1991
651991
Managing security policies in a distributed environment using extensible markup language (XML)
NN Vuong, GS Smith, Y Deng
Proceedings of the 2001 ACM symposium on Applied computing, 405-411, 2001
632001
Language issues in mobile program security
D Volpano, G Smith
Mobile Agents and Security, 25-43, 1998
631998
The system can't perform the operation now. Try again later.
Articles 1–20