M. Abadi and A. D. Gordon, A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999.
DOI : 10.1145/266420.266432

M. E. Andrés, C. Palamidessi, G. Peter-van-rossum, and . Smith, Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010.
DOI : 10.1007/978-3-642-12002-2_32

G. Barthe, B. Köpf, F. Olmedo, and S. Z. Béguelin, Probabilistic relational reasoning for differential privacy, Proc. of POPL. ACM, 2012.

M. Bhargava and C. Palamidessi, Probabilistic Anonymity, Proc. of CONCUR, pp.171-185, 2005.
DOI : 10.1007/11539452_16

URL : https://hal.archives-ouvertes.fr/inria-00201101

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Compositional Methods for Information-Hiding, Proc. of FOSSACS, pp.443-457, 2008.
DOI : 10.1007/978-3-540-78499-9_31

URL : https://hal.archives-ouvertes.fr/hal-01006384

M. Brusò, K. Chatzikokolakis, and J. Hartog, Formal Verification of Privacy for RFID Systems, 2010 23rd IEEE Computer Security Foundations Symposium, pp.75-88, 2010.
DOI : 10.1109/CSF.2010.13

K. Chatzikokolakis and C. Palamidessi, Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006.
DOI : 10.1016/j.tcs.2006.08.033

URL : https://hal.archives-ouvertes.fr/inria-00201109

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proc. of DIAU, pp.44-66, 2000.
DOI : 10.1007/3-540-44702-4_4

M. Thomas, J. A. Cover, and . Thomas, Elements of Information Theory, 1991.

Y. Deng, J. Pang, and P. Wu, Measuring Anonymity with Relative Entropy, Proc. of the 4th Int. Worshop on Formal Aspects in Security and Trust, pp.65-79, 2006.
DOI : 10.1007/978-3-540-75227-1_5

C. Dwork, Differential Privacy, Automata, Languages and Programming, 33rd International Colloquium Proceedings, Part II, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011.
DOI : 10.1145/1866739.1866758

C. Dwork and J. Lei, Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009.
DOI : 10.1145/1536414.1536466

Y. Joseph, K. R. Halpern, and . Neill, Anonymity and information hiding in multiagent systems, J. of Comp. Security, vol.13, issue.3, pp.483-512, 2005.

S. Hamadou, C. Palamidessi, V. Sassone, and E. Elsalamouny, Probable Innocence in the Presence of Independent Knowledge, Postproceedings of the 6th Int. Workshop on Formal Aspects in Security and Trust, pp.141-156, 2010.
DOI : 10.1007/978-3-642-12459-4_11

F. Mcsherry, Privacy integrated queries: an extensible platform for privacy-preserving data analysis, Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp.19-30, 2009.

R. Milner, Communication and Concurrency, Series in Comp. Sci, 1989.

A. Mukhamedov and M. D. Ryan, Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus, ACM Transactions on Information and System Security, vol.13, issue.4, p.41, 2010.
DOI : 10.1145/1880022.1880035

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

J. Reed and B. C. Pierce, Distance makes the types grow stronger: a calculus for differential privacy, Proceeding of the 15th ACM SIGPLAN international conference on Functional programming (ICFP), pp.157-168, 2010.

K. Michael, A. D. Reiter, and . Rubin, Crowds: anonymity for Web transactions, ACM Trans. on Information and System Security, vol.1, issue.1, pp.66-92, 1998.

I. Roy, T. V. Srinath, A. Setty, V. Kilzer, E. Shmatikov et al., Airavat: security and privacy for MapReduce, Proc. of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp.297-312, 2010.

V. Sassone, E. Elsalamouny, and S. Hamadou, Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols, Proc. of the Fifth Int. Symposium on Trustworthly Global Computing, pp.88-102, 2010.
DOI : 10.1007/978-3-642-15640-3_7

URL : http://eprints.soton.ac.uk/268594/1/crowds-trustTGC.pdf

R. Segala, Modeling and Verification of Randomized Distributed Real-Time Systems, 1995.

F. Paul, D. M. Syverson, M. G. Goldschlag, and . Reed, Anonymous connections and onion routing, Proc. of S&P, pp.44-54, 1997.

C. Michael, D. Tschantz, A. Kaynar, and . Datta, Formal verification of differential privacy for interactive systems (extended abstract), Electron. Notes Theor. Comput. Sci, vol.276, pp.61-79, 2011.