FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013. ,
DOI : 10.1145/2508859.2516674
Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013. ,
DOI : 10.1109/CSF.2013.23
URL : https://hal.archives-ouvertes.fr/hal-00924138
Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007. ,
DOI : 10.1109/CSF.2007.27
URL : https://hal.archives-ouvertes.fr/inria-00200957
Measuring information leakage using generalized gain functions, IEEE Computer Security Foundations Symposium (CSF'12), pp.265-279, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00734044
Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009. ,
Communication through channels in cascade, 1953. ,
Differential Privacy, ICALP, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Calibrating Noise to Sensitivity in Private Data Analysis, TCC 2006, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
The Panopticlick project ,
Min-entropy as a resource, Information and Computation, vol.226, pp.57-75, 2013. ,
DOI : 10.1016/j.ic.2013.03.005
Operational Versus Weakest Precondition Semantics for the Probabilistic Guarded Command Language, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.168-177, 2012. ,
DOI : 10.1109/QEST.2012.21
Precise quantitative information flow analysis using symbolic model counting, QASA, 2012. ,
SAT-Based Analysis and Quantification of Information Flow in Programs, Proc. of 10th International Conference on Quantitative Evaluation of Systems (QUEST), pp.156-171, 2013. ,
DOI : 10.1007/978-3-642-40196-1_16
Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010. ,
DOI : 10.1109/CSF.2010.8
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010. ,
DOI : 10.1109/CSF.2010.11
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
DOI : 10.1145/1217299.1217302
Dynamic Enforcement of Knowledge-Based Security Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.114-128, 2011. ,
DOI : 10.1109/CSF.2011.15
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation, Journal of Computer Security, vol.21, issue.4, pp.463-532, 2013. ,
DOI : 10.3233/JCS-130469
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013. ,
DOI : 10.1109/SP.2013.43
Relationship privacy, Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, PODS '09, pp.107-116, 2009. ,
DOI : 10.1145/1559795.1559812
Theory of Linear and Integer Programming, 1998. ,
On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009. ,
DOI : 10.1137/060651380
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002. ,
DOI : 10.1142/S021848850200165X
Counting Integer Points in Parametric Polytopes Using Barvinok's Rational Functions, Algorithmica, vol.48, issue.1, pp.37-66, 2007. ,
DOI : 10.1007/s00453-006-1231-0
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.1822