H. Brenner and K. Nissim, Impossibility of differentially private universally optimal mechanisms, Proc. of FOCS, pp.71-80, 2010.

C. Dwork, Differential privacy, Proc. of ICALP, pp.1-12, 2006.

C. Dwork and J. Lei, Differential privacy and robust statistics, Proc. of STOC, pp.371-380, 2009.
DOI : 10.1145/1536414.1536466

C. Dwork, Differential privacy in new settings, Proc. of SODA, pp.174-183, 2010.

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011.

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utility-maximizing privacy mechanisms, Proc. of STOC, pp.351-360, 2009.
DOI : 10.1145/1536414.1536464

URL : http://arxiv.org/abs/0811.2841

M. Gupte and M. Sundararajan, Universally optimal privacy mechanisms for minimax agents, Proc. of PODS, pp.135-146, 2010.
DOI : 10.1145/1807085.1807105

URL : http://arxiv.org/abs/1001.2767

M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, and C. Palamidessi, On the relation between Differential Privacy and Quantitative Information Flow, Proc. of ICALP, pp.60-76, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00627937

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proc. of CCS, pp.286-296, 2007.

D. Clark, S. Hunt, and P. Malacaria, Quantitative information flow, relations and polymorphic types, J. of Logic and Computation, vol.18, issue.2, pp.181-199, 2005.
DOI : 10.1093/logcom/exi009

URL : http://logcom.oxfordjournals.org/cgi/content/short/15/2/181

M. Boreale, Quantifying information leakage in process calculi, Proc. of ICALP, pp.119-131, 2006.

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008.
DOI : 10.1007/978-3-540-75336-0_18

URL : https://hal.archives-ouvertes.fr/inria-00349225

G. Smith, On the foundations of quantitative information flow, Proc. of FOSSACS, pp.288-302, 2009.

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative notions of leakage for one-try attacks, Proc. of MFPS, pp.75-91, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00424852

B. Köpf and G. Smith, Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks, Proc. of CSF, pp.44-56, 2010.

M. E. Andrés, C. Palamidessi, P. Van-rossum, and G. Smith, Computing the leakage of information-hiding systems, Proc. of TACAS, pp.373-389, 2010.

G. Barthe and B. Köpf, Information-theoretic bounds for differentially private mechanisms, Proc. of CSF, pp.191-204, 2011.

M. R. Clarkson and F. B. Schneider, Quantification of integrity, 2011.

M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, P. Degano, and C. Palamidessi, Differential Privacy: on the trade-off between Utility and Information Leakage, Postproceedings of the 8th Int. Worshop on Formal Aspects in Security and Trust (FAST, pp.39-54, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00580122

A. Rényi, On Measures of Entropy and Information, Proc. of the 4th Berkeley Symposium on Mathematics, pp.547-561, 1961.

D. Kifer and B. R. Lin, Towards an axiomatization of statistical privacy and utility, Proc. of PODS, pp.147-158, 2010.

D. Kifer and B. R. Lin, An axiomatic view of statistical privacy and utility, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.5-49, 2012.