A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999. ,
DOI : 10.1145/266420.266432
Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010. ,
DOI : 10.1007/978-3-642-12002-2_32
Probabilistic relational reasoning for differential privacy, Proc. of POPL. ACM, 2012. ,
Probabilistic Anonymity, Proc. of CONCUR, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Compositional Methods for Information-Hiding, Proc. of FOSSACS, pp.443-457, 2008. ,
DOI : 10.1007/978-3-540-78499-9_31
URL : https://hal.archives-ouvertes.fr/hal-01006384
Formal Verification of Privacy for RFID Systems, 2010 23rd IEEE Computer Security Foundations Symposium, pp.75-88, 2010. ,
DOI : 10.1109/CSF.2010.13
Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006. ,
DOI : 10.1016/j.tcs.2006.08.033
URL : https://hal.archives-ouvertes.fr/inria-00201109
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proc. of DIAU, pp.44-66, 2000. ,
DOI : 10.1007/3-540-44702-4_4
Elements of Information Theory, 1991. ,
Measuring Anonymity with Relative Entropy, Proc. of the 4th Int. Worshop on Formal Aspects in Security and Trust, pp.65-79, 2006. ,
DOI : 10.1007/978-3-540-75227-1_5
Differential Privacy, Automata, Languages and Programming, 33rd International Colloquium Proceedings, Part II, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009. ,
DOI : 10.1145/1536414.1536466
Anonymity and information hiding in multiagent systems, J. of Comp. Security, vol.13, issue.3, pp.483-512, 2005. ,
Probable Innocence in the Presence of Independent Knowledge, Postproceedings of the 6th Int. Workshop on Formal Aspects in Security and Trust, pp.141-156, 2010. ,
DOI : 10.1007/978-3-642-12459-4_11
Privacy integrated queries: an extensible platform for privacy-preserving data analysis, Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp.19-30, 2009. ,
Communication and Concurrency, Series in Comp. Sci, 1989. ,
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus, ACM Transactions on Information and System Security, vol.13, issue.4, p.41, 2010. ,
DOI : 10.1145/1880022.1880035
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
Distance makes the types grow stronger: a calculus for differential privacy, Proceeding of the 15th ACM SIGPLAN international conference on Functional programming (ICFP), pp.157-168, 2010. ,
Crowds: anonymity for Web transactions, ACM Trans. on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
Airavat: security and privacy for MapReduce, Proc. of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp.297-312, 2010. ,
Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols, Proc. of the Fifth Int. Symposium on Trustworthly Global Computing, pp.88-102, 2010. ,
DOI : 10.1007/978-3-642-15640-3_7
URL : http://eprints.soton.ac.uk/268594/1/crowds-trustTGC.pdf
Modeling and Verification of Randomized Distributed Real-Time Systems, 1995. ,
Anonymous connections and onion routing, Proc. of S&P, pp.44-54, 1997. ,
Formal verification of differential privacy for interactive systems (extended abstract), Electron. Notes Theor. Comput. Sci, vol.276, pp.61-79, 2011. ,