Catuscia Measuring Information Leakage Using Generalized Gain Functions, Proc. of CSF, pp.265-279, 2012. ,
Information hiding in probabilistic concurrent systems, Theoretical Computer Science, vol.412, issue.28, pp.3072-3089, 2011. ,
DOI : 10.1016/j.tcs.2011.02.045
URL : https://hal.archives-ouvertes.fr/hal-00548187
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011. ,
DOI : 10.1109/CSF.2011.20
Quantifying Information Leakage of Randomized Protocols, Proc. of VMCAI, pp.68-8710, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009. ,
DOI : 10.1016/j.ic.2008.12.007
Asymptotic Information Leakage under One-Try Attacks, Proc. of FOSSACS, pp.396-410, 2011. ,
DOI : 10.1007/978-3-642-19805-2_27
Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, ENTCS 249, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discrete Event Dynamic Systems 18, pp.111-15910, 2008. ,
Making random choices invisible to the scheduler, Proc. of CONCUR'07, pp.42-58, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00424860
Anonymity Protocols as Noisy Channels, Inf. Comput, vol.20624, pp.378-401, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00349225
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
DOI : 10.1145/358549.358563
A Tool for Estimating Information Leakage, Proc. of CAV'13, pp.10-1007, 2013. ,
DOI : 10.1007/978-3-642-39799-8_47
LeakWatch: Estimating Information Leakage from Java Programs, Proc. of ESORICS'14, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
Quantitative Analysis of the Leakage of Confidential Data, Proc. of QAPL'01, pp.238-25110, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
Min-Entropy Leakage of Channels in Cascade, Proc. of FAST, pp.70-84, 2011. ,
DOI : 10.1007/978-3-642-29420-4_5
Min-entropy as a resource, Information and Computation, vol.226, 2013. ,
DOI : 10.1016/j.ic.2013.03.005
Compositionality Results for Quantitative Information Flow, Proc. of QEST'14, pp.368-383, 2014. ,
DOI : 10.1007/978-3-319-10696-0_28
URL : https://hal.archives-ouvertes.fr/hal-01006381
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Proc. of CRYPTO'96, pp.104-11310, 1996. ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Abstract Channels and Their Robust Information-Leakage Ordering, Proc. of POST'14, pp.83-102, 2014. ,
DOI : 10.1007/978-3-642-54792-8_5
On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167, 2011. ,
DOI : 10.1109/QEST.2011.31
Model Checking Interactive Markov Chains, Proc. of TACAS'10, pp.53-68, 2010. ,
DOI : 10.1007/978-3-642-12002-2_5