S. Mário, M. E. Alvim, K. Andrés, P. Chatzikokolakis, C. Degano et al., Differential Privacy: on the Trade-Off between Utility and Information Leakage, Postproceedings of the 8th International Worshop on Formal Aspects in Security and Trust (FAST), pp.39-54, 2011.

S. Mário, M. E. Alvim, K. Andrés, C. Chatzikokolakis, and . Palamidessi, On the relation between Differential Privacy and Quantitative Information Flow, 38th International Colloquium on Automata, Languages and Programming (ICALP), pp.60-76, 2011.

S. Mário, K. Alvim, P. Chatzikokolakis, C. Degano, . Palamidessi et al., Differential privacy versus quantitative information flow, 2010.

S. Mário, K. Alvim, C. Chatzikokolakis, G. Palamidessi, and . Smith, Measuring information leakage using generalized gain functions, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.265-279, 2012.

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

M. Jose, A. F. Bernardo, and . Smith, Bayesian Theory, 1994.

A. Blum, K. Ligett, and A. Roth, A learning theory approach to non-interactive database privacy, Proceedings of the fourtieth annual ACM symposium on Theory of computing, STOC 08, pp.609-618, 2008.
DOI : 10.1145/1374376.1374464

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Compositional Methods for Information-Hiding, Proceedings of the 11th International Conference on the Foundations of Software Science and Computation Structures, pp.443-457, 2008.
DOI : 10.1007/978-3-540-78499-9_31

URL : https://hal.archives-ouvertes.fr/hal-01006384

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proceedings of the 25th Conf. on Mathematical Foundations of Programming Semantics, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

A. E. Brouwer, A. M. Cohen, and A. Neumaier, Distance Regular Graphs, Ergebnisse der Mathematik 3, 1989.

R. Michael, F. B. Clarkson, and . Schneider, Quantification of integrity, Mathematical Structures in Computer Science, vol.25, issue.2, pp.207-258, 2015.

C. Dwork, Differential Privacy, 33rd International Colloquium on Automata, Languages and Programming (ICALP), pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, Differential Privacy in New Settings, Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.174-183, 2010.
DOI : 10.1137/1.9781611973075.16

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-95, 2011.
DOI : 10.1145/1866739.1866758

C. Dwork and J. Lei, Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009.
DOI : 10.1145/1536414.1536466

B. Espinoza and G. Smith, Min-Entropy Leakage of Channels in Cascade, Proceedings of the International Worshop on Formal Aspects in Security and Trust (FAST), pp.70-84, 2011.
DOI : 10.1007/978-3-642-29420-4_5

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utility-maximizing privacy mechanisms, Proceedings of the 41st annual ACM Symposium on Theory of Computing (STOC), pp.351-360, 2009.
DOI : 10.1145/1536414.1536464

URL : http://arxiv.org/abs/0811.2841

M. Hardt and G. N. Rothblum, A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.61-70, 2010.
DOI : 10.1109/FOCS.2010.85

J. Heusser and P. Malacaria, Applied Quantitative Information Flow and Statistical Databases, Proceedings of the International Workshop on Formal Aspects in Security and Trust, pp.96-110, 2009.
DOI : 10.1007/978-3-642-12459-4_8

W. Imrich and S. Klav?ar, Product graphs, structure and recognition. Wiley-Interscience series in discrete mathematics and optimization, 2000.

S. Prasad-kasiviswanathan and A. Smith, A note on differential privacy: Defining resistance to arbitrary side information. Cryptology ePrint Archive, Report, vol.144, 2008.

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, Compositionality Results for Quantitative Information Flow, Proceedings of the 11th International Conference on Quantitative Evaluation of SysTems, pp.368-383, 2014.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01006381

D. Kifer and A. Machanavajjhala, No free lunch in data privacy, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.193-204, 2011.
DOI : 10.1145/1989323.1989345

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007.
DOI : 10.1109/FOCS.2007.66

A. Roth and T. Roughgarden, Interactive privacy via the median mechanism, Proceedings of the 42nd ACM symposium on Theory of computing, STOC '10, pp.765-774, 2010.
DOI : 10.1145/1806689.1806794

G. Smith, On the Foundations of Quantitative Information Flow, Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures, pp.288-302, 2009.
DOI : 10.1137/060651380

G. Smith, Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.5-8, 2011.
DOI : 10.1109/QEST.2011.31