A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00349225

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011.
DOI : 10.1145/1866739.1866758

C. Dwork, Differential Privacy, Proc. of ICALP, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, and . Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proc. of TCC, pp.265-284, 2006.
DOI : 10.1007/11681878_14

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008.
DOI : 10.1109/SP.2008.33

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi, Broadening the Scope of Differential Privacy Using Metrics, Proc. of PETS, pp.82-102, 2013.
DOI : 10.1007/978-3-642-39077-7_5

URL : https://hal.archives-ouvertes.fr/hal-00767210

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geoindistinguishability: differential privacy for location-based systems, Proc. of CCS, pp.901-914, 2013.

M. Gaboardi, A. Haeberlen, J. Hsu, A. R. Narayan, and B. C. Pierce, Linear dependent types for differential privacy, Proceedings of POPL 2013
URL : https://hal.archives-ouvertes.fr/hal-00909340

G. Barthe and F. Olmedo, Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs, Automata, Languages, and Programming -40th Int. Colloquium, ICALP 2013 Proceedings, Part II, pp.49-60, 2013.
DOI : 10.1007/978-3-642-39212-2_8

G. Barthe, B. Köpf, F. Olmedo, and S. Z. Béguelin, Probabilistic relational reasoning for differential privacy, ACM Trans. Program. Lang. Syst, vol.35, issue.3, p.9, 2013.

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utility-maximizing privacy mechanisms, Proc. of STOC, pp.351-360, 2009.

H. Brenner and K. Nissim, Impossibility of Differentially Private Universally Optimal Mechanisms, Proc. of FOCS, pp.71-80, 2010.
DOI : 10.1137/110846671

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, P. Degano, and C. Palamidessi, Differential Privacy: On the Trade-Off between Utility and Information Leakage, Postproceedings of the 8th Int. Worshop on Formal Aspects in Security and Trust (FAST, pp.39-54, 2011.
DOI : 10.1007/978-3-642-29420-4_3

URL : https://hal.archives-ouvertes.fr/inria-00580122

M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, and C. Palamidessi, On the Relation between Differential Privacy and Quantitative Information Flow, Proc. of ICALP, pp.60-76, 2011.
DOI : 10.1007/978-3-642-00596-1_21

URL : https://hal.archives-ouvertes.fr/inria-00627937

C. A. Ardagna, M. Cremonini, E. Damiani, S. D. Di-vimercati, and P. Samarati, Location Privacy Protection Through Obfuscation-Based Techniques, Proc. of DAS, pp.47-60, 2007.
DOI : 10.1109/69.971193

R. Shokri, G. Theodorakopoulos, J. Y. Boudec, and J. P. Hubaux, Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011.
DOI : 10.1109/SP.2011.18

URL : https://hal.archives-ouvertes.fr/hal-01266229

A. Rényi, On Measures of Entropy and Information, Proceedings of the 4th Berkeley Symposium on Mathematics, pp.547-561, 1961.

R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Boudec, Protecting location privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.617-627, 2012.
DOI : 10.1145/2382196.2382261

D. Kifer and B. R. Lin, Towards an axiomatization of statistical privacy and utility, Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data, PODS '10, pp.147-158, 2010.
DOI : 10.1145/1807085.1807106

D. Kifer and B. R. Lin, An axiomatic view of statistical privacy and utility, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.5-49, 2012.