Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Preventing side-channel leaks in web traffic: A formal approach, NDSS. The Internet Society, 2013. ,
Information leakage of non-terminating programs, FSTTCS, 2014. ,
Quantifying information leakage of randomized protocols, p.2013 ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
QUAIL: A Quantitative Security Analyzer for Imperative Code, p.2013 ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009. ,
DOI : 10.1016/j.ic.2008.12.007
Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries, Lecture Notes in Computer Science, vol.8461, pp.166-181, 2014. ,
DOI : 10.1007/978-3-662-43613-4_11
URL : https://hal.archives-ouvertes.fr/hal-01398015
On formally bounding information leakage by statistical estimation. Unpublished Manuscript, 2014. ,
Distributed MILS Architectural Approach for Secure Smart Grids, Smart Grid Security -Second International Workshop, pp.16-29, 2014. ,
DOI : 10.1007/978-3-319-10329-7_2
A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011. ,
DOI : 10.1109/CSF.2011.19
LeakWatch: Estimating Information Leakage from Java Programs, Lecture Notes in Computer Science, vol.8713, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991. ,
Automatic Quantification of Cache Side-Channels, CAV, pp.564-580, 2012. ,
DOI : 10.1007/978-3-642-31424-7_40
Establishing a smart grid node architecture and demonstrator in an office environment using the SOA approach, 2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids), pp.8-14, 2012. ,
DOI : 10.1109/SE4SG.2012.6225710
Electoral Engineering: Voting Rules and Political Behavior. Cambridge Studies in Comparative Politics, 2004. ,
Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014. ,
DOI : 10.1145/2590296.2590328
A Privacy-Friendly Framework for Vehicle-to-Grid Interactions, Lecture Notes in Computer Science, vol.8448, pp.125-138, 2014. ,
DOI : 10.1007/978-3-319-10329-7_8
On the Foundations of Quantitative Information Flow, Lecture Notes in Computer Science, vol.38, issue.1, pp.288-302, 2009. ,
DOI : 10.1137/060651380