{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2023,11,7]],“日期时间”:“2023-11-07T23:22:28Z”,“时间戳”:1699399348635},“引用计数”:46,“发布者”:“IEEE”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“published-print“:{”日期部分“:[[2010,7]]},“DOI”:“10.1109\/csf.2010.8”,“type”:“procesdings-article”,“created”:{“date-parts”:[[2010,8,24]],“date-time”:“2010-08-24T18:59:08Z”,“timestamp”:1282676348000},“source”:《Crossref》,“is-referenced-by-count”:38,“title”:[“定量信息流分析的近似和随机化”],“prefix”:“101109”,“author”:[{“给定”:“Boris”,”家庭”:“K\u00f6pf”,“sequence”:“first”,“affiliation”:[]},{“given”:“Andrey”,“family”:“Rybalchenko”,“序列”:“additional”,“从属关系”:[]}],“member”:“263”,“reference”:[{“key”:”ref39“,”doi-asserted-by“:”publisher“,”doi“10.1109 \/SP.1987.10013”},“key“:”ref38“,”“doi-assert-by”:”publider“,“doi”:“10.1145\/1375581.1375606”},{“key”:“ref33”,“doi-asserted-by”:“publisher”,“DOI”:“10.1007\/978-3-540-93900-9_20”},{“key”:“ref32”,“author”:“lalire”,“year”:“0”}.,{”key“:”ref31“,”DOI-asserted-by“:”publisher“,”DOI“:”10.1109\/CSF.2009.21“},”{“密钥”:“ref30”,“首页”:“286”,“article-title”:“自适应侧通道攻击的信息理论模型”,“年份”:“2007”,“新闻标题”:“Proc ACM Conf on Computer and Communications Security(CCS’07)”},{“key”:“ref37”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ISIT.1994.394764”}、{“key”:”ref36“,”doi-assert-by“:”publisher“,”doi“:”10.1145\/1190216.1190251“},“key“:”ref35“,”doi-asserted-by“”:”publiser“,“doi:”10.1109\/CSFW.20021218 04“},{”key“:”ref34“,”author“:”loera“,”year“:”0“,“journal-title”:“LATTES”},{“key”:“ref10”,“article-title“:”BitScope:“自动解析恶意二进制文件”,“author”:“brumley”,“year”:“2007”,“johnal-tittle”:”技术报告CS-07–133计算机科学学院“},“key“:”ref11“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/TDSC.2008.55“}”,{”key“:”ref40“,”doi-asserted-by“”:“publisher”,“内政部”:“10.1007\/s10990-006-8609-1”},{“key”:“ref12”,“author”:“cachin”,“year”:“1997”,“journal-title”:“密码学中的熵度量和无条件安全”}:“USENIX操作系统设计与实现研讨会论文集(OSDI'02)”},{“key”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.1093\/logcom\/exi009”}:“用简单命令式语言量化信息流的静态分析”,“volume”:“15”,“author”:“clark”,“year”:“2007”,“journal-title”:“journal of Computer Security”},{“key”:”ref16“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/CSFW.2005.10“},”{“密钥”:“ref17”,“首页”:“297”,“article-title“:“顺序程序中的信息传输”,“author”:“cohen”,“year”:“1978”,“journal-title”:“安全计算基础”},{“key”:“ref18”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/FMCAD.2009.5351120”}出版商“,”内政部“:“10.1007\/978-3-642-02658-4_52”},{“key”:“ref4”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1057387.1057391”}、{“密钥”:“ref27”、“doi-sserted-by“:”publisher“,”doi“:”10.1145\/964001.964021“},“key“:”ref3“,”doi-assert-by““key”:“ref6”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CSFW.2004.1310735”},{“key”:“ref29”,“first-page”:“104”,“article-title”:“对Diffie-Hellman、RSA、DSS和其他系统实现的定时攻击”,“author”:“kocher”,“year”:“1996”,“journal-title“:“Proc Annual Intl Cryptology Conference(CRYPTO’96)”},{“密钥”:“ref5”,“首页”:“339”,“article-title”:“显式解密策略和模块化静态实施”,“author”:“banerjee”,“year”:“2008”,“journal-title”:“Proc IEEE Symp-Security and Privacy(S&P)},{“key”:“ref8”,“first page”:《678》,“article-title》:“The complexity of approximating entary”,“author”:“batu”,“year”:“2002”,“journal-ttitle”:《Proc ACM Symp-on-Theory of Computing(STOC)》},{“key”:“ref7”,“doi-asserted-by”:“publisher”,“doi”:“10.1287\/moor.19.4.769”},{“key”:“ref2”,“doi-asserte-by”:“publisher”,“DI:”10.1016\/j.scico.2007.08.001“},“key“:”ref1“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/SP.2009.18“}”,{by“:”publisher“,”doi“:”10.1145\/781151.781153“},{”key“:”ref20“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145\\512760.512770”},{“key”:“ref46”,“DOI断言者”:“publisher”,“DOI”:“10.1109\\CSFW.2001.930133”},{“key”:“ref45”,“首页”:“288”,“文章标题”:“基于定量信息流”,“作者”:“smith”,“年份”:“2009”,“期刊标题”:“Proc Intl Conf of Foundations of Software Science and Computation Structures(FoSSaCS’09)”},{“key”:“ref22”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/964017”}0.1065036“},{“key”:“ref42”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/JSAC.2002.806121”},{“key”:”ref23“,”doi-assert-by“:”publisher“,”doi“:”10.1007\/s10703-005-1489-x“},”key“:”ref41“,”doi-asserted-by““:”publisher“,”doi“:”10.1145\/1542476.1542518“},{”key“:”ref44“,“doi断言者”:“publisher”,“doi”:“10.1002\/j.158-7305.1948.tb01338.x”},{“key”:“ref25”,“doi断言者”:“crossref”,“首页”:“3”,“doi”:“10.3233\/JCS-992-13-405”,“文章标题”:“走向信息流安全的数学基础”,“卷”:“1”,“作者”:“灰色”,“年份”:“1992”,“期刊标题”:“计算机安全期刊”},{“key”:“ref43”,“first page”:“174”,“article-title”:“分隔信息发布模型”,“author”:“sablefeld”,“year”:“2004”,“journal-title“:”Proc International Symption on Software Security(ISSS'03)“}],“event”:{“name”:“2010 IEEE第23届计算机安全基础研讨会(CSF)”,“location”:“Edinburgh,United Kingdom”,“start”:{“date-parts”:[2010,7,17]]},“end”:{“date-parts”:[[2010,7,19]]}},“container-title”:[“2010第23届IEEE计算机安全基础研讨会”],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx5\/5552633\/55552636\/05552658.pdf?arnumber=5552658”,“content-type”:“未指定”,“内容版本”:“vor”,“intended-application”:“相似性检查”“}],“存放”:{“日期部分”:[[2019,6,2],“日期时间”:“2019-06-02T07:40:57Z”,“时间戳”:1559461257000},“分数”:1,“资源”:{“主要”:{:“URL”:“http://\/ieeexplore.iee.org\/document\/5552658\/”}},”副标题“:[],”短标题“:[],”已发布“日期部分“:[[2010,7]]}”,“引用计数”:46,“URL”:“http://\/dx.doi.org\/10.109\/csf.2010.8”,“关系”:{},“主题”:[],“发布”:{“日期部分”:[[2010,7]]}}