G. Acar, M. Juárez, N. Nikiforakis, C. Díaz, S. F. Gürses et al., FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013.
DOI : 10.1145/2508859.2516674

F. Besson, N. Bielova, and T. Jensen, Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013.
DOI : 10.1109/CSF.2013.23

URL : https://hal.archives-ouvertes.fr/hal-00924138

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007.
DOI : 10.1109/CSF.2007.27

URL : https://hal.archives-ouvertes.fr/inria-00200957

K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring information leakage using generalized gain functions, IEEE Computer Security Foundations Symposium (CSF'12), pp.265-279, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00734044

R. Michael, A. C. Clarkson, F. B. Myers, and . Schneider, Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009.

C. A. Desoer, Communication through channels in cascade, 1953.

C. Dwork, Differential Privacy, ICALP, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, TCC 2006, pp.265-284, 2006.
DOI : 10.1007/11681878_14

P. Eckersley, The Panopticlick project

B. Espinoza and G. Smith, Min-entropy as a resource, Information and Computation, vol.226, pp.57-75, 2013.
DOI : 10.1016/j.ic.2013.03.005

F. Gretz, J. Katoen, and A. Mciver, Operational Versus Weakest Precondition Semantics for the Probabilistic Guarded Command Language, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.168-177, 2012.
DOI : 10.1109/QEST.2012.21

V. Klebanov, Precise quantitative information flow analysis using symbolic model counting, QASA, 2012.

V. Klebanov, N. Manthey, and C. Muise, SAT-Based Analysis and Quantification of Information Flow in Programs, Proc. of 10th International Conference on Quantitative Evaluation of Systems (QUEST), pp.156-171, 2013.
DOI : 10.1007/978-3-642-40196-1_16

B. Köpf and A. Rybalchenko, Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010.
DOI : 10.1109/CSF.2010.8

B. Köpf and G. Smith, Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010.
DOI : 10.1109/CSF.2010.11

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217302

P. Mardziel, S. Magill, M. Hicks, and M. Srivatsa, Dynamic Enforcement of Knowledge-Based Security Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.114-128, 2011.
DOI : 10.1109/CSF.2011.15

P. Mardziel, S. Magill, M. Hicks, and M. Srivatsa, Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation, Journal of Computer Security, vol.21, issue.4, pp.463-532, 2013.
DOI : 10.3233/JCS-130469

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.
DOI : 10.1109/SP.2013.43

V. Rastogi, M. Hay, G. Miklau, and D. Suciu, Relationship privacy, Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, PODS '09, pp.107-116, 2009.
DOI : 10.1145/1559795.1559812

A. Schrijver, Theory of Linear and Integer Programming, 1998.

G. Smith, On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009.
DOI : 10.1137/060651380

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

S. Verdoolaege, R. Seghir, K. Beyls, V. Loechner, and M. Bruynooghe, Counting Integer Points in Parametric Polytopes Using Barvinok's Rational Functions, Algorithmica, vol.48, issue.1, pp.37-66, 2007.
DOI : 10.1007/s00453-006-1231-0

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.1822