M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, P. Degano, and C. Palamidessi, Differential Privacy: On the Trade-Off between Utility and Information Leakage, Formal Aspects in Security and Trust, pp.39-54, 2011.
DOI : 10.1007/978-3-642-29420-4_3

URL : https://hal.archives-ouvertes.fr/inria-00580122

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, p.2013
URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, B. F. Nielsen, and A. Wasowski, Maximizing entropy over Markov processes, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242613

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, Sharygina and Veith
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

H. Chen and P. Malacaria, Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009.
DOI : 10.1145/1533057.1533087

Y. Chen, J. Jan, and C. Chen, The design of a secure anonymous Internet voting system, Computers & Security, vol.23, issue.4, pp.330-337, 2004.
DOI : 10.1016/j.cose.2004.01.015

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, Sharygina and Veith [18], pp.690-695
DOI : 10.1007/978-3-642-39799-8_47

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008.
DOI : 10.1109/SP.2008.32

D. Gritzali, Principles and requirements for a secure e-voting system, Computers & Security, vol.21, issue.6, pp.539-556
DOI : 10.1016/S0167-4048(02)01014-3

P. Norris, Electoral Engineering: Voting Rules and Political Behavior. Cambridge Studies in Comparative Politics, 2004.

Q. Phan and P. Malacaria, Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014.
DOI : 10.1145/2590296.2590328

C. E. Shannon, A mathematical theory of communication. The Bell system technical journal, pp.379-423, 1948.