M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

M. Backes, G. Doychev, and B. Köpf, Preventing side-channel leaks in web traffic: A formal approach, NDSS. The Internet Society, 2013.

F. Biondi, A. Legay, P. Malacaria, B. F. Nielsen, and A. Wasowski, Information leakage of non-terminating programs, FSTTCS, 2014.

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, p.2013
URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, p.2013
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

M. Boreale, Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009.
DOI : 10.1016/j.ic.2008.12.007

M. Boreale and F. Pampaloni, Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries, Lecture Notes in Computer Science, vol.8461, pp.166-181, 2014.
DOI : 10.1007/978-3-662-43613-4_11

URL : https://hal.archives-ouvertes.fr/hal-01398015

M. Boreale and M. Paolini, On formally bounding information leakage by statistical estimation. Unpublished Manuscript, 2014.

D. Bytschkow, J. Quilbeuf, G. Igna, and H. Ruess, Distributed MILS Architectural Approach for Secure Smart Grids, Smart Grid Security -Second International Workshop, pp.16-29, 2014.
DOI : 10.1007/978-3-319-10329-7_2

T. Chothia and A. Guha, A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011.
DOI : 10.1109/CSF.2011.19

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, Lecture Notes in Computer Science, vol.8713, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

J. W. Iii, Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991.

B. Köpf, L. Mauborgne, and M. Ochoa, Automatic Quantification of Cache Side-Channels, CAV, pp.564-580, 2012.
DOI : 10.1007/978-3-642-31424-7_40

D. Koss, F. Sellmayr, S. Bauereiß, D. Bytschkow, P. K. Gupta et al., Establishing a smart grid node architecture and demonstrator in an office environment using the SOA approach, 2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids), pp.8-14, 2012.
DOI : 10.1109/SE4SG.2012.6225710

P. Norris, Electoral Engineering: Voting Rules and Political Behavior. Cambridge Studies in Comparative Politics, 2004.

Q. Phan and P. Malacaria, Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014.
DOI : 10.1145/2590296.2590328

C. Rottondi, S. Fontana, and G. Verticale, A Privacy-Friendly Framework for Vehicle-to-Grid Interactions, Lecture Notes in Computer Science, vol.8448, pp.125-138, 2014.
DOI : 10.1007/978-3-319-10329-7_8

G. Smith, On the Foundations of Quantitative Information Flow, Lecture Notes in Computer Science, vol.38, issue.1, pp.288-302, 2009.
DOI : 10.1137/060651380