Florida International University
Edit Your Profile
FIU Discovery
Toggle navigation
Browse
Home
People
Organizations
Scholarly & Creative Works
Research Facilities
Support
Smith, Geoffrey
Profile QR Code
Share this page
Twitter
Email
Copy link
Share
Publications
Research
View All
Publications
selected scholarly works & creative activities
Article
2019
An axiomatization of information flow measures
.
Theoretical Computer Science
. 777:32-54.
Full Text via DOI:
10.1016/j.tcs.2018.10.016
Web of Science:
000473372800003
2013
Min-entropy as a resource
.
Information and Computation
. 226:57-75.
Full Text via DOI:
10.1016/j.ic.2013.03.005
Web of Science:
000318263000005
2011
Non-termination and secure information flow
.
Mathematical Structures in Computer Science
. 21:1183-1205.
Full Text via DOI:
10.1017/S0960129511000181
Web of Science:
000297409300003
2006
Secure information flow with random assignment and encryption
Full Text via DOI:
10.1145/1180337.1180341
2006
Improved typings for probabilistic noninterference in a multi-threaded language
.
Journal of Computer Security
. 14:591-623.
Full Text via DOI:
10.3233/JCS-2006-14605
2006
Medication decisions and clinical outcomes in the Canadian National Outcomes Measurement Study in Schizophrenia
.
Acta Psychiatrica Scandinavica
. 113:12-21.
Full Text via DOI:
10.1111/j.1600-0447.2006.00757.x
2006
Outcome on quality of life in a Canadian national sample of patients with schizophrenia and related psychotic disorders
.
Acta Psychiatrica Scandinavica
. 113:22-28.
Full Text via DOI:
10.1111/j.1600-0447.2006.00758.x
2006
Resource utilization in a Canadian national study of people with schizophrenia and related psychotic disorders
.
Acta Psychiatrica Scandinavica
. 113:29-39.
Full Text via DOI:
10.1111/j.1600-0447.2006.00759.x
2006
The Canadian National Outcomes Measurement Study in Schizophrenia: Overview of the patient sample and methodology
.
Acta Psychiatrica Scandinavica
. 113:4-11.
Full Text via DOI:
10.1111/j.1600-0447.2006.00756.x
1999
Probabilistic noninterference in a concurrent language
.
Journal of Computer Security
. 7:231-253.
Full Text via DOI:
10.3233/JCS-1999-72-305
1998
A sound polymorphic type system for a dialect of C
.
Science of Computer Programming
. 32:49-72.
Full Text via DOI:
10.1016/s0167-6423(97)00030-0
1996
On the systematic design of web languages
.
ACM Computing Surveys
. 28:315-317.
Full Text via DOI:
10.1145/234528.234737
1996
Polymorphic Typing of Variables and References
.
ACM Transactions on Programming Languages and Systems
. 18:254-267.
Full Text via DOI:
10.1145/229542.229544
1996
Sound type system for secure flow analysis
.
Journal of Computer Security
. 4:167-187.
Full Text via DOI:
10.3233/JCS-1996-42-304
1995
A type soundness proof for variables in LCF ML
.
Information Processing Letters
. 56:141-146.
Full Text via DOI:
10.1016/0020-0190(95)00146-4
1994
Commentary: Security, gender, and the historical process
.
Diplomatic History
. 18:79-90.
Full Text via DOI:
10.1111/j.1467-7709.1994.tb00197.x
1994
Principal type schemes for functional programs with overloading and subtyping
.
Science of Computer Programming
. 23:197-226.
Full Text via DOI:
10.1016/0167-6423(94)00020-4
1992
National Security and Personal Isolation: Sex, Gender, and Disease in the Cold-War United States
.
International History Review
. 14:307-337.
Full Text via DOI:
10.1080/07075332.1992.9640616
1985
Introduction
.
Diplomatic History
. 9:293-294.
Full Text via DOI:
10.1111/j.1467-7709.1985.tb00537.x
1982
Isolationism, the Devil, and the Advent of the Second World War: Variations on a Theme
.
International History Review
. 4:55-89.
Full Text via DOI:
10.1080/07075332.1982.9640267
Book
2020
Introduction
Full Text via DOI:
10.1007/978-3-319-96131-6_1
Book Chapter
2020
A demonic lattice of information
. 325-350.
Full Text via DOI:
10.1007/978-3-319-96131-6_17
2020
Axiomatics
. 183-204.
Full Text via DOI:
10.1007/978-3-319-96131-6_11
2020
Capacity
. 107-130.
Full Text via DOI:
10.1007/978-3-319-96131-6_7
2020
Channels
. 49-70.
Full Text via DOI:
10.1007/978-3-319-96131-6_4
2020
Composition of channels
. 131-145.
Full Text via DOI:
10.1007/978-3-319-96131-6_8
2020
Defense against side channels
. 389-397.
Full Text via DOI:
10.1007/978-3-319-96131-6_20
2020
Differential privacy
. 433-444.
Full Text via DOI:
10.1007/978-3-319-96131-6_23
2020
Hidden-Markov modeling of QIF in sequential programs
. 255-282.
Full Text via DOI:
10.1007/978-3-319-96131-6_14
2020
Iteration and nontermination
. 307-323.
Full Text via DOI:
10.1007/978-3-319-96131-6_16
2020
Modeling secrets
. 17-23.
Full Text via DOI:
10.1007/978-3-319-96131-6_2
2020
Multi-party computation: The Three Judges protocol
. 399-411.
Full Text via DOI:
10.1007/978-3-319-96131-6_21
2020
On $$ \mathit {g} $$ -vulnerability
. 25-46.
Full Text via DOI:
10.1007/978-3-319-96131-6_3
2020
Posterior vulnerability and leakage
. 71-100.
Full Text via DOI:
10.1007/978-3-319-96131-6_5
2020
Program algebra for QIF
. 283-305.
Full Text via DOI:
10.1007/978-3-319-96131-6_15
2020
Quantitative information flow in sequential computer programs
. 225-253.
Full Text via DOI:
10.1007/978-3-319-96131-6_13
2020
Refinement
. 147-170.
Full Text via DOI:
10.1007/978-3-319-96131-6_9
2020
Robustness
. 101-105.
Full Text via DOI:
10.1007/978-3-319-96131-6_6
2020
The Crowds protocol
. 353-367.
Full Text via DOI:
10.1007/978-3-319-96131-6_18
2020
The Dalenius perspective
. 171-181.
Full Text via DOI:
10.1007/978-3-319-96131-6_10
2020
The geometry of hypers, gains and losses
. 205-221.
Full Text via DOI:
10.1007/978-3-319-96131-6_12
2020
Timing attacks on blinded and bucketed cryptography
. 369-388.
Full Text via DOI:
10.1007/978-3-319-96131-6_19
2020
Voting systems
. 413-431.
Full Text via DOI:
10.1007/978-3-319-96131-6_22
2019
Refinement Metrics for Quantitative Information Flow
. 397-416.
Full Text via DOI:
10.1007/978-3-030-31175-9_23
Web of Science:
000611814500030
Conference
2019
Quantifying Information Leakage of Deterministic Encryption
. 129-139.
Full Text via DOI:
10.1145/3338466.3358915
Web of Science:
000557325500012
2017
Tight Bounds on Information Leakage from Repeated Independent Runs
.
Proceedings of the Computer Security Foundations Workshop
. 318-327.
Full Text via DOI:
10.1109/CSF.2017.18
Web of Science:
000426068500023
2016
Axioms for Information Leakage
.
Proceedings of the Computer Security Foundations Workshop
. 77-92.
Full Text via DOI:
10.1109/CSF.2016.13
Web of Science:
000390301600008
2016
Correlated Secrets in Quantitative Information Flow
.
Proceedings of the Computer Security Foundations Workshop
. 93-104.
Full Text via DOI:
10.1109/CSF.2016.14
Web of Science:
000390301600009
2015
Recent Developments in Quantitative Information Flow
.
Proceedings - Symposium on Logic in Computer Science
. 23-31.
Full Text via DOI:
10.1109/LICS.2015.13
Web of Science:
000380427100005
2014
Abstract channels and their robust information-leakage ordering
.
Lecture Notes in Computer Science
. 83-102.
Full Text via DOI:
10.1007/978-3-642-54792-8_5
2014
Additive and multiplicative notions of leakage, and their capacities
.
Proceedings of the Computer Security Foundations Workshop
. 308-322.
Full Text via DOI:
10.1109/CSF.2014.29
Web of Science:
000380924200021
2012
Min-entropy leakage of channels in cascade
.
Lecture Notes in Computer Science
. 70-84.
Full Text via DOI:
10.1007/978-3-642-29420-4_5
2012
Measuring Information Leakage using Generalized Gain Functions
.
Proceedings of the Computer Security Foundations Workshop
. 265-279.
Full Text via DOI:
10.1109/CSF.2012.26
Web of Science:
000309007800018
2011
Calculating bounds on information leakage using two-bit patterns
Full Text via DOI:
10.1145/2166956.2166957
2011
Quantifying information flow using min-entropy
. 159-167.
Full Text via DOI:
10.1109/QEST.2011.31
2010
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
.
Proceedings - IEEE Computer Security Foundations Symposium
. 44-56.
Full Text via DOI:
10.1109/CSF.2010.11
2010
Computing the leakage of information-hiding systems
.
Lecture Notes in Computer Science
. 373-389.
Full Text via DOI:
10.1007/978-3-642-12002-2_32
2010
Secure Information Flow for Distributed Systems
.
Lecture Notes in Computer Science
. 126-140.
Web of Science:
000279740300010
2009
On the Foundations of Quantitative Information Flow
.
Lecture Notes in Computer Science
. 288-302.
Web of Science:
000265829200021
2008
Anatomy of a real-time intrusion prevention system
. 151-160.
Full Text via DOI:
10.1109/ICAC.2008.24
2008
Adversaries and information leaks
.
Lecture Notes in Computer Science
. 383-400.
Web of Science:
000254511800023
2007
Fast Probabilistic Simulation, Nontermination, and Secure Information Flow
. 67-71.
Full Text via DOI:
10.1145/1255329.1255341
Web of Science:
000266156200009
2006
Inductive bases and their application to searches for minimal unary NFAs
. 470-475.
Full Text via DOI:
10.1145/1185448.1185552
2006
Type inference and informative error reporting for secure information flow
. 543-548.
Full Text via DOI:
10.1145/1185448.1185567
2004
Lenient array operations for practical secure information flow
.
Proceedings of the Computer Security Foundations Workshop
. 115-124.
2003
Probabilistic noninterference through weak probabilistic bisimulation
.
Proceedings of the Computer Security Foundations Workshop
. 3-13.
Full Text via DOI:
10.1109/CSFW.2003.1212701
2001
Managing security policies in a distributed environment using eXtensible Markup Language (XML)
. 405-411.
Full Text via DOI:
10.1145/372202.372386
2001
A new type system for secure information flow
.
Proceedings of the Computer Security Foundations Workshop
. 115-125.
2000
Verifying secrets and relative secrecy
.
Conference Record of the Annual ACM Symposium on Principles of Programming Languages
. 268-276.
Full Text via DOI:
10.1145/325694.325729
1999
Confinement properties for multi-threaded programs
.
Electronic Notes in Theoretical Computer Science
. 132-142.
Full Text via DOI:
10.1016/S1571-0661(04)80071-9
1998
Probabilistic noninterference in a concurrent language
.
Proceedings of the Computer Security Foundations Workshop
. 34-43.
Full Text via DOI:
10.1109/CSFW.1998.683153
1998
Secure information flow in a multi-threaded imperative language
.
Conference Record of the Annual ACM Symposium on Principles of Programming Languages
. 355-364.
Full Text via DOI:
10.1145/268946.268975
1997
A type-based approach to program security
.
Lecture Notes in Computer Science
. 607-621.
Full Text via DOI:
10.1007/bfb0030629
1997
Eliminating covert flows with minimum typings
.
Proceedings - IEEE Computer Security Foundations Symposium
. 156-168.
Full Text via DOI:
10.1109/CSFW.1997.596807
1997
Eliminating covert flows with minimum typings
.
Proceedings of the Computer Security Foundations Workshop
. 156-168.
1996
Towards an ML-style polymorphic type system for C
.
Lecture Notes in Computer Science
. 341-355.
Full Text via DOI:
10.1007/3-540-61055-3_47
1993
Polymorphic type inference with overloading and subtyping
.
Lecture Notes in Computer Science
. 671-685.
Full Text via DOI:
10.1007/3-540-56610-4_97
1991
On the complexity of ML typability with overloading
.
Lecture Notes in Computer Science
. 15-28.
Full Text via DOI:
10.1007/3540543961_2
Other Scholarly Work
2015
Preface to the special issue on quantitative information flow
.
Mathematical Structures in Computer Science
. 203-206.
Full Text via DOI:
10.1017/S0960129513000583
Web of Science:
000347805000001
2007
Principles of secure information flow analysis
. 291-307.
Web of Science:
000245403000013
Research
principal investigator on
EAGER: Collaborative: Quantifying Information Leakage in Searchable Encryption
awarded by
National Science Foundation
2018 - 2021
Florida Center for Cybersecurity
awarded by
University of South Florida
2016 - 2017
Collaborative Cybersecurity Research at Florida SUS Institutions
awarded by
University of South Florida
2015 - 2017
TC: Small: Theory & Applications of Min-Entropy Leakage
awarded by
National Science Foundation
2011 - 2015
CT-ISG: New Foundations for Quantitative Information Flow.
awarded by
National Science Foundation
2008 - 2012
visualizations
Co-author Network
Co-investigator Network
Map of Science