Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010. ,
DOI : 10.1007/978-3-642-12002-2_32
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011. ,
DOI : 10.1109/CSF.2011.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6688
Quantifying information leakage in process calculi, Proc. of ICALP, pp.119-131, 2006. ,
Asymptotic information leakage under one-try attacks, Proc. of FOSSACS, pp.396-410, 2011. ,
DOI : 10.1007/978-3-642-19805-2_27
Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS. ENTCS, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Smooth Entropy and R??nyi Entropy, pp.193-208, 1997. ,
DOI : 10.1007/3-540-69053-0_14
Statistical Measurement of Information Leakage, Proc. of TACAS, pp.390-404, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008. ,
DOI : 10.1007/978-3-540-75336-0_18
URL : https://hal.archives-ouvertes.fr/inria-00349225
On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008. ,
DOI : 10.3233/JCS-2008-0333
URL : https://hal.archives-ouvertes.fr/inria-00349224
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
Statistical estimation of min-entropy leakage, 2014. ,
A Tool for Estimating Information Leakage, Proc. of CAV, p.2013, 2013. ,
DOI : 10.1007/978-3-642-39799-8_47
LeakWatch: Estimating Information Leakage from Java Programs, Proc. of ESORICS, p.2014, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Quantitative Analysis of the Leakage of Confidential Data, Proc. of QAPL. ENTCS, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
Min-entropy as a resource, Information and Computation, vol.226, 2013. ,
DOI : 10.1016/j.ic.2013.03.005
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
PRISM 2.0: a tool for probabilistic model checking, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings., pp.322-323, 2004. ,
DOI : 10.1109/QEST.2004.1348048
Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007. ,
Topology Discovery in Dynamic and Decentralized Networks with Mobile Agents and Swarm Intelligence, Seventh International Conference on Intelligent Systems Design and Applications (ISDA 2007), pp.685-690, 2007. ,
DOI : 10.1109/ISDA.2007.13
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
Trust in Anonymity Networks, In: CONCUR. pp, pp.48-70, 2010. ,
DOI : 10.1007/978-3-642-15375-4_5
URL : https://hal.archives-ouvertes.fr/hal-00760437
Probabilistic analysis of anonymity, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.119-128, 2002. ,
DOI : 10.1109/CSFW.2002.1021811
On the Foundations of Quantitative Information Flow, Proc. of FOS- SACS. LNCS, pp.288-302, 2009. ,
DOI : 10.1137/060651380