Differential Privacy: On the Trade-Off between Utility and Information Leakage, Formal Aspects in Security and Trust, pp.39-54, 2011. ,
DOI : 10.1007/978-3-642-29420-4_3
URL : https://hal.archives-ouvertes.fr/inria-00580122
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011. ,
DOI : 10.1109/CSF.2011.20
Quantifying information leakage of randomized protocols, p.2013 ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
Maximizing entropy over Markov processes, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242613
QUAIL: A Quantitative Security Analyzer for Imperative Code, Sharygina and Veith ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009. ,
DOI : 10.1145/1533057.1533087
The design of a secure anonymous Internet voting system, Computers & Security, vol.23, issue.4, pp.330-337, 2004. ,
DOI : 10.1016/j.cose.2004.01.015
A Tool for Estimating Information Leakage, Sharygina and Veith [18], pp.690-695 ,
DOI : 10.1007/978-3-642-39799-8_47
Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008. ,
DOI : 10.1109/SP.2008.32
Principles and requirements for a secure e-voting system, Computers & Security, vol.21, issue.6, pp.539-556 ,
DOI : 10.1016/S0167-4048(02)01014-3
Electoral Engineering: Voting Rules and Political Behavior. Cambridge Studies in Comparative Politics, 2004. ,
Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014. ,
DOI : 10.1145/2590296.2590328
A mathematical theory of communication. The Bell system technical journal, pp.379-423, 1948. ,