TY - CHAP
T1 - Hidden-Markov modeling of QIF in sequential programs
AU - Alvim, Mário S.
AU - Chatzikokolakis, Konstantinos
AU - McIver, Annabelle
AU - Morgan, Carroll
AU - Palamidessi, Catuscia
AU - Smith, Geoffrey
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - In the last chapter we made the case for embedding our treatment of QIF, developed in Parts I–III as “channels that leak”, in a programming-language setting.
AB - In the last chapter we made the case for embedding our treatment of QIF, developed in Parts I–III as “channels that leak”, in a programming-language setting.
UR - https://www.scopus.com/pages/publications/85091565612
U2 - 10.1007/978-3-319-96131-6_14
DO - 10.1007/978-3-319-96131-6_14
M3 - Chapter
AN - SCOPUS:85091565612
T3 - Information Security and Cryptography
SP - 255
EP - 282
BT - Information Security and Cryptography
PB - Springer Science and Business Media Deutschland GmbH
ER -