Differential privacy: on the trade-off between utility and information leakage, 2011. ,
Pierpaolo Degano, and Catuscia Palamidessi. Differential privacy versus quantitative information flow, 2010. ,
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, 2011. ,
DOI : 10.1109/CSF.2011.20
Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Entropy Measures and Unconditional Security in Cryptography, 1997. ,
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008. ,
DOI : 10.3233/JCS-2008-0333
URL : https://hal.archives-ouvertes.fr/inria-00349224
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Quantitative Information Flow, Relations and Polymorphic Types, Journal of Logic and Computation, vol.15, issue.2, pp.181-199, 2005. ,
DOI : 10.1093/logcom/exi009
Quantification of integrity, 2011. ,
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380
Differential Privacy, Automata, Languages and Programming, 33rd Int. Colloquium Proc., Part II, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Differential Privacy in New Settings, Proc. of the Twenty- First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp.174-183, 2010. ,
DOI : 10.1137/1.9781611973075.16
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009. ,
DOI : 10.1145/1536414.1536466
Universally utilitymaximizing privacy mechanisms, Proc. of the 41st annual ACM symposium on Theory of computing, STOC '09, pp.351-360, 2009. ,
Applied Quantitative Information Flow and Statistical Databases, Proc. of the Int. Workshop on Formal Aspects in Security and Trust, pp.96-110, 2009. ,
DOI : 10.1007/978-3-642-12459-4_8
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007. ,
Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008. ,
DOI : 10.1145/1375696.1375713
Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994. ,
DOI : 10.1109/ISIT.1994.394764
Covert channels and anonymizing networks, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.79-88, 2003. ,
DOI : 10.1145/1005140.1005153
Quasi-anonymous channels, Proc. of CNIS, pp.126-131, 2003. ,
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks, Proc. of INDOCRYPT, number 1977 in LNCS, pp.67-79, 2000. ,
DOI : 10.1007/3-540-44495-5_7
On Measures of Entropy and Information, Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1961. ,
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Anonymity vs. information leakage in anonymity systems, Proc. of ICDCS, pp.514-524, 2005. ,