L. De-alfaro, Formal Verification of Probabilistic Systems, 1997.

M. Bhargava and C. Palamidessi, Probabilistic Anonymity, LNCS, vol.3653, pp.171-185, 2005.
DOI : 10.1007/11539452_16

URL : https://hal.archives-ouvertes.fr/inria-00201101

F. Biondi, A. Legay, P. Malacaria, and A. , Quantifying information leakage of randomized protocols. To appear in VMCAI 2013, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242614

K. Chatterjee, K. Sen, and T. Henzinger, Model-Checking ??-Regular Properties of Interval Markov Chains, p.FoSSaCS, 2008.
DOI : 10.1007/978-3-540-78499-9_22

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00349225

H. Chen and P. Malacaria, Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009.
DOI : 10.1145/1533057.1533087

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, 2007.
DOI : 10.3233/JCS-2007-15302

T. Cover and J. Thomas, Elements of information theory, 1991.

V. Girardin, Entropy Maximization for Markov and Semi-Markov Processes, Methodology and Computing in Applied Probability, vol.6, issue.1, pp.109-127, 2004.
DOI : 10.1023/B:MCAP.0000012418.88825.18

E. T. Jaynes, Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, pp.620-630, 1957.
DOI : 10.1103/PhysRev.106.620

B. Jonsson and K. G. Larsen, Specification and refinement of probabilistic processes, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.266-277, 1991.
DOI : 10.1109/LICS.1991.151651

I. Kozine and L. V. Utkin, Interval-valued finite markov chains, Reliable Computing, vol.8, issue.2, pp.97-113, 2002.
DOI : 10.1023/A:1014745904458

P. Malacaria, Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow, p.3453, 2011.

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008.
DOI : 10.1145/1375696.1375713

J. K. Millen, Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66, 1987.
DOI : 10.1109/SP.1987.10013

M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming, 1994.
DOI : 10.1002/9780470316887

C. E. Shannon, A mathematical theory of communication. The Bell system technical journal 27, pp.379-423, 1948.

J. Stoer, R. Bulirsch, R. Bartels, W. Gautschi, and C. Witzgall, Introduction to Numerical Analysis, Texts in Applied Mathematics, 2010.