M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

M. Andrés, C. Palamidessi, P. Van-rossum, and G. Smith, Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010.
DOI : 10.1007/978-3-642-12002-2_32

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6688

M. Boreale, Quantifying information leakage in process calculi, Proc. of ICALP, pp.119-131, 2006.

M. Boreale, F. Pampaloni, and M. Paolini, Asymptotic information leakage under one-try attacks, Proc. of FOSSACS, pp.396-410, 2011.
DOI : 10.1007/978-3-642-19805-2_27

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS. ENTCS, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

C. Cachin, Smooth Entropy and R??nyi Entropy, pp.193-208, 1997.
DOI : 10.1007/3-540-69053-0_14

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, Proc. of TACAS, pp.390-404, 2010.
DOI : 10.1007/978-3-642-12002-2_33

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008.
DOI : 10.1007/978-3-540-75336-0_18

URL : https://hal.archives-ouvertes.fr/inria-00349225

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008.
DOI : 10.3233/JCS-2008-0333

URL : https://hal.archives-ouvertes.fr/inria-00349224

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

T. Chothia and Y. Kawamoto, Statistical estimation of min-entropy leakage, 2014.

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, Proc. of CAV, p.2013, 2013.
DOI : 10.1007/978-3-642-39799-8_47

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, Proc. of ESORICS, p.2014, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Proc. of QAPL. ENTCS, pp.238-251, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

B. Espinoza and G. Smith, Min-entropy as a resource, Information and Computation, vol.226, 2013.
DOI : 10.1016/j.ic.2013.03.005

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

M. Z. Kwiatkowska, G. Norman, and D. Parker, PRISM 2.0: a tool for probabilistic model checking, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings., pp.322-323, 2004.
DOI : 10.1109/QEST.2004.1348048

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

B. Nassu, T. Nanya, and E. Duarte, Topology Discovery in Dynamic and Decentralized Networks with Mobile Agents and Swarm Intelligence, Seventh International Conference on Intelligent Systems Design and Applications (ISDA 2007), pp.685-690, 2007.
DOI : 10.1109/ISDA.2007.13

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

V. Sassone, S. Hamadou, and M. Yang, Trust in Anonymity Networks, In: CONCUR. pp, pp.48-70, 2010.
DOI : 10.1007/978-3-642-15375-4_5

URL : https://hal.archives-ouvertes.fr/hal-00760437

V. Shmatikov, Probabilistic analysis of anonymity, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.119-128, 2002.
DOI : 10.1109/CSFW.2002.1021811

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOS- SACS. LNCS, pp.288-302, 2009.
DOI : 10.1137/060651380