Information Flow in Interactive Systems, Proceedings of the 21th International Conference on Concurrency Theory, pp.102-116, 2010. ,
DOI : 10.1007/978-3-642-15375-4_8
URL : https://hal.archives-ouvertes.fr/inria-00479672
Computing the Leakage of Information-Hiding Systems, Proceedings of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.373-389, 2010. ,
DOI : 10.1007/978-3-642-12002-2_32
Information hiding in probabilistic concurrent systems, Proceedings of the 7th IEEE International Conference on Quantitative Evaluation of SysTems, pp.17-26, 2010. ,
Probabilistic Anonymity, Probabilistic anonymityProceedings of the 16th International Conference on Concurrency Theory, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Asymptotic Information Leakage under One-Try Attacks, Proceedings of the 14th International Conference on the Foundations of Software Science and Computational Structures (FOSSACS'11), pp.396-410, 2011. ,
DOI : 10.1007/978-3-642-19805-2_27
Making random choices invisible to the scheduler, Information and Computation, vol.208, issue.6, pp.694-715, 2010. ,
DOI : 10.1016/j.ic.2009.06.006
URL : https://hal.archives-ouvertes.fr/inria-00424860
Anonymity protocols as noisy channels, Information and Computation, vol.206, pp.2-4, 2008. ,
DOI : 10.1007/978-3-540-75336-0_18
URL : https://hal.archives-ouvertes.fr/inria-00349225
On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008. ,
DOI : 10.3233/JCS-2008-0333
URL : https://hal.archives-ouvertes.fr/inria-00349224
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
A Course in Probability Theory, 2000. ,
Quantitative Analysis of the Leakage of Confidential Data, Proceedings of the Workshop on Quantitative Aspects of Programming Languages, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
Quantified Interference for a While Language, Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, pp.149-166, 2004. ,
DOI : 10.1016/j.entcs.2004.01.018
Belief in Information Flow, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.655-701, 2009. ,
DOI : 10.1109/CSFW.2005.10
Compositional Reasoning for Probabilistic Finite-State Behaviors, Processes, Terms and Cycles: Steps on the Road to Infinity, pp.309-337, 2005. ,
DOI : 10.1007/11601548_17
URL : https://hal.archives-ouvertes.fr/hal-00159683
Measuring Anonymity with Relative Entropy, Postproceedings of the 4th International Workshop on Formal Aspects in Security and Trust, pp.65-79, 2006. ,
DOI : 10.1007/978-3-540-75227-1_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.1531
The metric analogue of weak bisimulation for probabilistic processes, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science, pp.413-422, 2002. ,
DOI : 10.1109/LICS.2002.1029849
Towards Measuring Anonymity, Proceedings of the workshop on Privacy Enhancing Technologies, pp.54-68, 2002. ,
DOI : 10.1007/3-540-36467-6_5
A practical secret voting scheme for large scale elections, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques. Advancaes in Cryptology (AUSCRYPT '92, pp.244-251, 1993. ,
DOI : 10.1007/3-540-57220-1_66
Probabilistic anonymity and admissible schedulers, 2007. ,
Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005. ,
DOI : 10.3233/JCS-2005-13305
Reconciling Belief and Vulnerability in Information Flow, 2010 IEEE Symposium on Security and Privacy, pp.79-92, 2010. ,
DOI : 10.1109/SP.2010.13
URL : https://hal.archives-ouvertes.fr/inria-00548007
Probabilistic Asynchronous ??-Calculus, Proceedings of the Third International Conference on Foundations of Software Science and Computation Structures, pp.146-160, 2000. ,
DOI : 10.1007/3-540-46432-8_10
URL : http://arxiv.org/pdf/cs/0109002v1.pdf
Applied Quantitative Information Flow and Statistical Databases, Proceedings of the International Workshop on Formal Aspects in Security and Trust, pp.96-110, 2009. ,
DOI : 10.1007/978-3-642-12459-4_8
Toward a mathematical foundation for information flow security, Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP '91, pp.21-35, 1991. ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Quantifying information flow, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.18-31, 2002. ,
DOI : 10.1109/CSFW.2002.1021804
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1444
Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007. ,
Lagrange multipliers and maximum information leakage in different observational models, in´Ulfarin´ in´Ulfar Erlingsson and Marco Pistoia, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, pp.135-146, 2008. ,
Compositional Closure for Bayes Risk in Probabilistic Noninterference, Proceedings of the 37th International Colloquium on Automata, Languages and Programming, pp.223-235, 2010. ,
DOI : 10.1007/978-3-642-14162-1_19
Security models and information flow, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.180-189, 1990. ,
DOI : 10.1109/RISP.1990.63849
Quasi-anonymous channels, Proceedings of the IASTED International Conference on Communication, Network, and Information Security, pp.126-131, 2003. ,
A Randomized Distributed Encoding of the ??-Calculus with Mixed Choice, Theoretical Computer Science, vol.335, issue.2-3, pp.373-404, 2005. ,
DOI : 10.1007/978-0-387-35608-2_44
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
On Measures of Entropy and Information, Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability', pp.547-561, 1961. ,
Modeling and Verification of Randomized Distributed Real-Time Systems, 1995. ,
Probabilistic simulations for probabilistic processes, Nordic Journal of Computing, vol.2, issue.2, pp.250-273, 1995. ,
DOI : 10.1007/bfb0015027
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6430
Towards an Information Theoretic Metric for Anonymity, Proceedings of the Workshop on Privacy Enhancing Technologies, pp.41-53, 2002. ,
DOI : 10.1007/3-540-36467-6_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.5992
On the Foundations of Quantitative Information Flow, Proceedings of the 12th International Conference on Foundations of Software Science and, 2009. ,
DOI : 10.1137/060651380