Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
2013 | Conference Paper | IST-REx-ID: 2940 |
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.View | Files available | DOI
2013 | Conference Paper | IST-REx-ID: 2000 |
J. Reiter, I. Božić, K. Chatterjee, and M. Nowak, “TTP: Tool for tumor progression,” in Proceedings of 25th Int. Conf. on Computer Aided Verification, St. Petersburg, Russia, 2013, vol. 8044, pp. 101–106.View | Files available | DOI | Download Preprint (ext.) | arXiv
2013 | Journal Article | IST-REx-ID: 2009 |
C. Uhler, A. Slavkovic, and S. Fienberg, “Privacy-preserving data sharing for genome-wide association studies,” Journal of Privacy and Confidentiality , vol. 5, no. 1. Carnegie Mellon University, pp. 137–166, 2013.View | DOI | Download Published Version (ext.)
2013 | Journal Article | IST-REx-ID: 2010 |
C. Uhler, G. Raskutti, P. Bühlmann, and B. Yu, “Geometry of the faithfulness assumption in causal inference,” The Annals of Statistics, vol. 41, no. 2. Institute of Mathematical Statistics, pp. 436–463, 2013.View | DOI | Download Published Version (ext.) | arXiv