M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.18

B. Bérard, J. Mullins, and M. Sassolas, Quantifying opacity, 2010.

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242614

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, TACAS, 2010.
DOI : 10.1007/978-3-642-12002-2_33

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00349225

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

T. Chothia and A. Guha, A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011.
DOI : 10.1109/CSF.2011.19

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, 2007.
DOI : 10.3233/JCS-2007-15302

S. Kiefer, A. S. Murawski, J. Ouaknine, B. Wachter, and J. Worrell, APEX: An Analyzer for Open Probabilistic Programs, Proc. CAV'12, 2012.
DOI : 10.1007/978-3-642-31424-7_51

V. Klebanov, Precise quantitative information flow analysis using symbolic model counting, p.2012

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315282

B. Köpf, L. Mauborgne, and M. Ochoa, Automatic Quantification of Cache Side-Channels, p.2012
DOI : 10.1007/978-3-642-31424-7_40

M. Kwiatkowska, G. Norman, and D. Parker, PRISM 4.0: Verification of Probabilistic Real-Time Systems, Proc. CAV'11, 2011.
DOI : 10.1007/3-540-45657-0_17

URL : https://hal.archives-ouvertes.fr/hal-00648035

P. Malacaria, Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow. CoRR, abs/1101, 2011.

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity, 2008.

C. Mu and D. Clark, A Tool: Quantitative Analyser for Programs, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, 2011.
DOI : 10.1109/QEST.2011.25

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009.
DOI : 10.1145/1554339.1554349

Q. Phan, P. Malacaria, O. Tkachuk, and C. S. Pasareanu, Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012.
DOI : 10.1145/2382756.2382791

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

G. Smith, On the Foundations of Quantitative Information Flow, LNCS, vol.38, issue.1, pp.288-302, 2009.
DOI : 10.1137/060651380