default search action
Geoffrey Smith 0001
Person information
- affiliation: Florida International University, Miami, FL, USA
Other persons with the same name
- Geoffrey Smith — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c37]Mireya Jurado, Catuscia Palamidessi, Geoffrey Smith:
A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption. CSF 2021: 1-16 - 2020
- [b1]Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
The Science of Quantitative Information Flow. Information Security and Cryptography, Springer 2020, ISBN 978-3-319-96129-3, pp. I-XXVIII, 1-478
2010 – 2019
- 2019
- [j14]Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
An axiomatization of information flow measures. Theor. Comput. Sci. 777: 32-54 (2019) - [c36]Konstantinos Chatzikokolakis, Geoffrey Smith:
Refinement Metrics for Quantitative Information Flow. The Art of Modelling Computational Systems 2019: 397-416 - [c35]Mireya Jurado, Geoffrey Smith:
Quantifying Information Leakage of Deterministic Encryption. CCSW 2019: 129-139 - 2017
- [c34]David M. Smith, Geoffrey Smith:
Tight Bounds on Information Leakage from Repeated Independent Runs. CSF 2017: 318-327 - 2016
- [c33]Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
Axioms for Information Leakage. CSF 2016: 77-92 - [c32]Nicolás E. Bordenabe, Geoffrey Smith:
Correlated Secrets in Quantitative Information Flow. CSF 2016: 93-104 - 2015
- [j13]Miguel E. Andrés, Catuscia Palamidessi, Geoffrey Smith:
Preface to the special issue on quantitative information flow. Math. Struct. Comput. Sci. 25(2): 203-206 (2015) - [c31]Geoffrey Smith:
Recent Developments in Quantitative Information Flow (Invited Tutorial). LICS 2015: 23-31 - 2014
- [c30]Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
Additive and Multiplicative Notions of Leakage, and Their Capacities. CSF 2014: 308-322 - [c29]Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza, Larissa Meinicke:
Abstract Channels and Their Robust Information-Leakage Ordering. POST 2014: 83-102 - 2013
- [j12]Barbara Espinoza, Geoffrey Smith:
Min-entropy as a resource. Inf. Comput. 226: 57-75 (2013) - 2012
- [c28]Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith:
Measuring Information Leakage Using Generalized Gain Functions. CSF 2012: 265-279 - 2011
- [j11]Geoffrey Smith, Rafael Alpízar:
Non-termination and secure information flow. Math. Struct. Comput. Sci. 21(6): 1183-1205 (2011) - [c27]Barbara Espinoza, Geoffrey Smith:
Min-Entropy Leakage of Channels in Cascade. Formal Aspects in Security and Trust 2011: 70-84 - [c26]Ziyuan Meng, Geoffrey Smith:
Calculating bounds on information leakage using two-bit patterns. PLAS 2011: 1 - [c25]Geoffrey Smith:
Quantifying Information Flow Using Min-Entropy. QEST 2011: 159-167 - 2010
- [c24]Boris Köpf, Geoffrey Smith:
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. CSF 2010: 44-56 - [c23]Miguel E. Andrés, Catuscia Palamidessi, Peter van Rossum, Geoffrey Smith:
Computing the Leakage of Information-Hiding Systems. TACAS 2010: 373-389
2000 – 2009
- 2009
- [c22]Geoffrey Smith:
On the Foundations of Quantitative Information Flow. FoSSaCS 2009: 288-302 - [c21]Rafael Alpízar, Geoffrey Smith:
Secure Information Flow for Distributed Systems. Formal Aspects in Security and Trust 2009: 126-140 - 2008
- [c20]Ricardo Koller, Raju Rangaswami, Joseph Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, Seyed Masoud Sadjadi, Tao Li, Krista Merrill:
Anatomy of a Real-Time Intrusion Prevention System. ICAC 2008: 151-160 - 2007
- [c19]Geoffrey Smith, Rafael Alpízar:
Fast probabilistic simulation, nontermination, and secure information flow. PLAS 2007: 67-72 - [c18]Geoffrey Smith:
Adversaries and Information Leaks (Tutorial). TGC 2007: 383-400 - [p1]Geoffrey Smith:
Principles of Secure Information Flow Analysis. Malware Detection 2007: 291-307 - 2006
- [j10]Geoffrey Smith:
Improved typings for probabilistic noninterference in a multi-threaded language. J. Comput. Secur. 14(6): 591-623 (2006) - [c17]Geoffrey Smith:
Inductive bases and their application to searches for minimal unary NFAs. ACM Southeast Regional Conference 2006: 470-475 - [c16]Zhenyue Deng, Geoffrey Smith:
Type inference and informative error reporting for secure information flow. ACM Southeast Regional Conference 2006: 543-548 - [c15]Geoffrey Smith, Rafael Alpízar:
Secure information flow with random assignment and encryption. FMSE 2006: 33-44 - 2004
- [c14]Zhenyue Deng, Geoffrey Smith:
Lenient Array Operations for Practical Secure Information Flow. CSFW 2004: 115- - 2003
- [c13]Geoffrey Smith:
Probabilistic Noninterference through Weak Probabilistic Bisimulation. CSFW 2003: 3-13 - 2001
- [c12]Geoffrey Smith:
A New Type System for Secure Information Flow. CSFW 2001: 115-125 - [c11]Nathan N. Vuong, Geoffrey S. Smith, Yi Deng:
Managing security policies in a distributed environment using eXtensible markup language (XML). SAC 2001: 405-411 - 2000
- [j9]Geoffrey Smith, Dennis M. Volpano:
Basic research in information privacy. ACM SIGSOFT Softw. Eng. Notes 25(1): 86 (2000) - [c10]Dennis M. Volpano, Geoffrey Smith:
Verifying Secrets and Relative Secrecy. POPL 2000: 268-276
1990 – 1999
- 1999
- [j8]Dennis M. Volpano, Geoffrey Smith:
Probabilistic Noninterference in a Concurrent Language. J. Comput. Secur. 7(1) (1999) - [c9]Geoffrey Smith, Dennis M. Volpano:
Confinement Properties for Multi-Threaded Programs. MFPS 1999: 132-142 - 1998
- [j7]Geoffrey Smith, Dennis M. Volpano:
A Sound Polymorphic Type System for a Dialect of C. Sci. Comput. Program. 32(1-3): 49-72 (1998) - [j6]Dennis M. Volpano, Geoffrey Smith:
Confinement properties for programming languages. SIGACT News 29(3): 33-42 (1998) - [c8]Dennis M. Volpano, Geoffrey Smith:
Probabilistic Noninterference in a Concurrent Language. CSFW 1998: 34-43 - [c7]Dennis M. Volpano, Geoffrey Smith:
Language Issues in Mobile Program Security. Mobile Agents and Security 1998: 25-43 - [c6]Geoffrey Smith, Dennis M. Volpano:
Secure Information Flow in a Multi-Threaded Imperative Language. POPL 1998: 355-364 - 1997
- [c5]Dennis M. Volpano, Geoffrey Smith:
Eliminating Covert Flows with Minimum Typings. CSFW 1997: 156-169 - [c4]Dennis M. Volpano, Geoffrey Smith:
A Type-Based Approach to Program Security. TAPSOFT 1997: 607-621 - 1996
- [j5]Dennis M. Volpano, Geoffrey Smith:
On the Systematic Design of Web Languages. ACM Comput. Surv. 28(2): 315-317 (1996) - [j4]Dennis M. Volpano, Cynthia E. Irvine, Geoffrey Smith:
A Sound Type System for Secure Flow Analysis. J. Comput. Secur. 4(2/3): 167-188 (1996) - [j3]Geoffrey Smith, Dennis M. Volpano:
Polymorphic typing of Variables and References. ACM Trans. Program. Lang. Syst. 18(3): 254-267 (1996) - [c3]Geoffrey Smith, Dennis M. Volpano:
Towards an ML-Style Polymorphic Type System for C. ESOP 1996: 341-355 - 1995
- [j2]Dennis M. Volpano, Geoffrey Smith:
A Type Soundness Proof for Variables in LCF ML. Inf. Process. Lett. 56(3): 141-146 (1995) - 1994
- [j1]Geoffrey Smith:
Principal Type Schemes for Functional Programs with Overloading and Subtyping. Sci. Comput. Program. 23(2-3): 197-226 (1994) - 1993
- [c2]Geoffrey Smith:
Polymorphic Type Inference with Overloading and Subtyping. TAPSOFT 1993: 671-685 - 1991
- [c1]Dennis M. Volpano, Geoffrey S. Smith:
On the Complexity of ML Typability with Overloading. FPCA 1991: 15-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint