Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00349225
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
Differential Privacy, Proc. of ICALP, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Calibrating Noise to Sensitivity in Private Data Analysis, Proc. of TCC, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
Broadening the Scope of Differential Privacy Using Metrics, Proc. of PETS, pp.82-102, 2013. ,
DOI : 10.1007/978-3-642-39077-7_5
URL : https://hal.archives-ouvertes.fr/hal-00767210
Geoindistinguishability: differential privacy for location-based systems, Proc. of CCS, pp.901-914, 2013. ,
Linear dependent types for differential privacy, Proceedings of POPL 2013 ,
URL : https://hal.archives-ouvertes.fr/hal-00909340
Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs, Automata, Languages, and Programming -40th Int. Colloquium, ICALP 2013 Proceedings, Part II, pp.49-60, 2013. ,
DOI : 10.1007/978-3-642-39212-2_8
Probabilistic relational reasoning for differential privacy, ACM Trans. Program. Lang. Syst, vol.35, issue.3, p.9, 2013. ,
Universally utility-maximizing privacy mechanisms, Proc. of STOC, pp.351-360, 2009. ,
Impossibility of Differentially Private Universally Optimal Mechanisms, Proc. of FOCS, pp.71-80, 2010. ,
DOI : 10.1137/110846671
On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011. ,
DOI : 10.1109/CSF.2011.20
Differential Privacy: On the Trade-Off between Utility and Information Leakage, Postproceedings of the 8th Int. Worshop on Formal Aspects in Security and Trust (FAST, pp.39-54, 2011. ,
DOI : 10.1007/978-3-642-29420-4_3
URL : https://hal.archives-ouvertes.fr/inria-00580122
On the Relation between Differential Privacy and Quantitative Information Flow, Proc. of ICALP, pp.60-76, 2011. ,
DOI : 10.1007/978-3-642-00596-1_21
URL : https://hal.archives-ouvertes.fr/inria-00627937
Location Privacy Protection Through Obfuscation-Based Techniques, Proc. of DAS, pp.47-60, 2007. ,
DOI : 10.1109/69.971193
Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011. ,
DOI : 10.1109/SP.2011.18
URL : https://hal.archives-ouvertes.fr/hal-01266229
On Measures of Entropy and Information, Proceedings of the 4th Berkeley Symposium on Mathematics, pp.547-561, 1961. ,
Protecting location privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.617-627, 2012. ,
DOI : 10.1145/2382196.2382261
Towards an axiomatization of statistical privacy and utility, Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data, PODS '10, pp.147-158, 2010. ,
DOI : 10.1145/1807085.1807106
An axiomatic view of statistical privacy and utility, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.5-49, 2012. ,