A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
On the Foundations of Quantitative Information Flow, Proc. FOS- SACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167, 2011. ,
DOI : 10.1109/QEST.2011.31
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
On estimation of entropy and mutual information of continuous distributions, Signal Processing, vol.16, issue.3, pp.233-248, 1989. ,
DOI : 10.1016/0165-1684(89)90132-1
Some data analysis using mutual information, Brazilian Journal of Probability and Statistics, vol.18, issue.6, pp.163-183, 2004. ,
On Formally Bounding Information Leakage by Statistical Estimation, Unpublished Manuscript, 2014. ,
DOI : 10.1007/978-3-319-13257-0_13
QUAIL: A Quantitative Security Analyzer for Imperative Code, Proc. of the 25th International Conference on Computer Aided Verification, 2013. ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
A Tool: Quantitative Analyser for Programs, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.145-146, 2011. ,
DOI : 10.1109/QEST.2011.25
Quantitative Information Flow as Network Flow Capacity, Proc. of the Conference on Programming Language Design and Implementation, pp.193-205, 2008. ,
Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010. ,
DOI : 10.1145/1920261.1920300
Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012. ,
DOI : 10.1145/2382756.2382791
LeakWatch http ,
Statistical Measurement of Information Leakage, Proc. of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.390-404, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
Cryptography and Data Security, 1982. ,
Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.186-197, 1998. ,
DOI : 10.1109/SECPRI.1998.674834
X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling, Philosophical Magazine Series, vol.5, issue.302, pp.50-157, 1900. ,
URL : https://hal.archives-ouvertes.fr/hal-01438018
A Tool for Estimating Information Leakage, Proc. of the 25th Conference on Computer Aided Verification, pp.690-695, 2013. ,
DOI : 10.1007/978-3-642-39799-8_47
Compositionality Results for Quantitative Information Flow, Proc. of the 11th International Conference on Quantitative Evaluation of Systems, 2014. ,
DOI : 10.1007/978-3-319-10696-0_28
URL : https://hal.archives-ouvertes.fr/hal-01006381
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Wirelessly Pickpocketing a Mifare Classic Card, 2009 30th IEEE Symposium on Security and Privacy, pp.3-15, 2009. ,
DOI : 10.1109/SP.2009.6
Gone in 360 seconds: Hijacking with Hitag2, 21st USENIX Security Symposium (USENIX Security 2012), USENIX Association, pp.237-252, 2012. ,
OpenPGP Message Format http ,
DOI : 10.17487/rfc2440