P. Syverson, D. Goldschlag, and M. Reed, Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.44-54, 1997.
DOI : 10.1109/SECPRI.1997.601314

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3883

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A distributed anonymous information storage and retrieval system., in: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability Lecture Notes in Computer Science, pp.44-66, 2000.
DOI : 10.1007/3-540-44702-4_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919

P. F. Syverson and S. G. Stubblebine, Group Principals and the Formalization of Anonymity, World Congress on Formal Methods, issue.1, pp.814-833, 1999.
DOI : 10.1007/3-540-48119-2_45

J. Y. Halpern and K. R. , Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005.
DOI : 10.3233/JCS-2005-13305

URL : http://doi.org/10.3233/jcs-2005-13305

D. Hughes and V. Shmatikov, Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004.
DOI : 10.3233/JCS-2004-12102

URL : http://doi.org/10.3233/jcs-2004-12102

P. Y. Ryan and S. Schneider, Modelling and Analysis of Security Protocols, 2001.

M. Bhargava and C. Palamidessi, Probabilistic Anonymity, Proceedings of CONCUR, pp.171-185, 2005.
DOI : 10.1007/11539452_16

URL : https://hal.archives-ouvertes.fr/inria-00201101

K. Chatzikokolakis and C. Palamidessi, Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006.
DOI : 10.1016/j.tcs.2006.08.033

URL : https://hal.archives-ouvertes.fr/inria-00201109

Y. Zhu and R. Bettati, Anonymity vs. information leakage in anonymity systems, Proc. of ICDCS, pp.514-524, 2005.

D. Clark, S. Hunt, and P. Malacaria, Quantitative Information Flow, Relations and Polymorphic Types, Special Issue on Lambda-calculus, type theory and natural language, pp.181-199, 2005.
DOI : 10.1093/logcom/exi009

URL : http://logcom.oxfordjournals.org/cgi/content/short/15/2/181

P. Malacaria, Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007.

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in di?erent observational models, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, pp.135-146, 2008.
DOI : 10.1145/1375696.1375713

I. S. Moskowitz, R. E. Newman, and P. F. Syverson, Quasi-anonymous channels, CNIS, pp.126-131, 2003.

I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller, Covert channels and anonymizing networks, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.79-88, 2003.
DOI : 10.1145/1005140.1005153

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.7395

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, pp.2-4, 2008.
DOI : 10.1007/978-3-540-75336-0_18

URL : https://hal.archives-ouvertes.fr/inria-00349225

M. Franz, B. Meyer, and A. Pashalidis, Attacking Unlinkability: The Importance of Context, Privacy Enhancing Technologies, 7th International Symposium, PET 2007, pp.1-16, 2007.
DOI : 10.1007/978-3-540-75551-7_1

M. R. Clarkson, A. C. Myers, and F. B. Schneider, Belief in Information Flow, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.31-45, 2005.
DOI : 10.1109/CSFW.2005.10

M. R. Clarkson, A. C. Myers, and F. B. Schneider, Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009.
DOI : 10.3233/JCS-2009-0353

URL : http://doi.org/10.3233/jcs-2009-0353

G. Smith, Adversaries and Information Leaks (Tutorial), Proceedings of the Third Symposium on Trustworthy Global Computing, pp.383-400, 2007.
DOI : 10.1007/978-3-540-78663-4_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.6271

G. Smith, On the Foundations of Quantitative Information Flow, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures (FOS- SACS 2009), pp.288-302, 2009.
DOI : 10.1137/060651380

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

A. Mciver, C. Morgan, G. Smith, L. Espinoza, and . Meinicke, Abstract Channels and Their Robust Information-Leakage Ordering, Proceedings of the Third International Conference on Principles of Security and Trust (POST), pp.83-102, 2014.
DOI : 10.1007/978-3-642-54792-8_5

M. S. Alvim, K. Chatzikokolakis, A. Mciver, C. Morgan, C. Palamidessi et al., Additive and Multiplicative Notions of Leakage, and Their Capacities, 2014 IEEE 27th Computer Security Foundations Symposium, pp.308-322, 2014.
DOI : 10.1109/CSF.2014.29

URL : https://hal.archives-ouvertes.fr/hal-00989462

S. Hamadou, C. Palamidessi, V. Sassone, and E. Elsalamouny, Probable Innocence in the Presence of Independent Knowledge, Lecture Notes in Computer Science, vol.5983, pp.141-156, 2009.
DOI : 10.1007/978-3-642-12459-4_11

S. Hamadou, V. Sassone, and C. Palamidessi, Reconciling Belief and Vulnerability in Information Flow, 2010 IEEE Symposium on Security and Privacy, pp.79-92, 2010.
DOI : 10.1109/SP.2010.13

URL : https://hal.archives-ouvertes.fr/inria-00548007

A. P. Dempster, A Generalization of Bayesian Inference, Classic Works of the Dempster-Shafer Theory of Belief Functions of Studies in Fuzziness and Soft Computing, pp.73-104, 2008.
DOI : 10.1007/978-3-540-44792-4_4

G. Shafer, A Mathematical Theory of Evidence, 1976.

J. L. Massey, Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994.
DOI : 10.1109/ISIT.1994.394764

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in di?erent observational models, pp.135-146, 2008.
DOI : 10.1145/1375696.1375713

B. Köpf and D. A. Basin, An information-theoretic model for adaptive sidechannel attacks, ACM Conference on Computer and Communications Security, pp.286-296, 2007.

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.
DOI : 10.3233/JCS-2007-15302

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3
DOI : 10.1016/S1571-0661(04)00290-7

A. K. Hirsch and M. R. Clarkson, Belief semantics of authorization logic, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.561-572, 2013.
DOI : 10.1145/2508859.2516667

M. R. Clarkson and F. B. Schneider, Quantification of integrity, Mathematical Structures in Computer Science, vol.25, issue.2, p.0960129513000595

S. H. Hussein, A Precise Information Flow Measure from Imprecise Probabilities, 2012 IEEE Sixth International Conference on Software Security and Reliability, pp.128-137, 2012.
DOI : 10.1109/SERE.2012.25

URL : http://arxiv.org/abs/1206.5487

G. J. Klir, Uncertainty and Information: Foundations of Generalized Information Theory, 2005.
DOI : 10.1002/0471755575

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, 2008.
DOI : 10.3233/JCS-2008-0333

URL : https://hal.archives-ouvertes.fr/inria-00349224

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

M. Andrés, C. Palmidessi, P. Van-rossum, and G. Smith, Computing the amount of leakage in information-hiding systems, Tech. rep, 2009.

R. Chadha, U. Mathur, and S. Schwoon, Computing information flow using symbolic model-checking, 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014 of LIPIcs, Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, pp.505-516, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01110118

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, Proceedings of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pp.390-404, 2010.
DOI : 10.1007/978-3-642-12002-2_33

D. Dubois and H. Prade, Possibility theory, probability theory and multiplevalued logics: A clarification, Ann. Math. Artif. Intell, vol.32, pp.1-4, 2001.
DOI : 10.1007/3-540-45493-4_26

L. A. Zadeh, Book review, Information and Control, vol.4, issue.1, pp.81-83, 1984.
DOI : 10.1016/S0019-9958(61)80044-2

R. R. Yager, On the dempster-shafer framework and new combination rules, Information Sciences, vol.41, issue.2, pp.93-137, 1987.
DOI : 10.1016/0020-0255(87)90007-7

P. Smets and R. Kennes, The transferable belief model, Classic Works of the Dempster-Shafer Theory of Belief Functions of Studies in Fuzziness and Soft Computing, pp.693-736, 2008.
DOI : 10.1016/0004-3702(94)90026-4

URL : https://hal.archives-ouvertes.fr/hal-01185821

D. Dubois and H. Prade, Representation and combination of uncertainty with belief functions and possibility measures, Computational Intelligence, vol.5, issue.1, pp.244-264, 1988.
DOI : 10.1016/0165-0114(78)90029-5

P. Smets, Belief functions: The disjunctive rule of combination and the generalized Bayesian theorem, International Journal of Approximate Reasoning, vol.9, issue.1, pp.1-35, 1993.
DOI : 10.1016/0888-613X(93)90005-X

J. Dezert and F. Smarandache, A new probabilistic transformation of belief mass assignment
URL : https://hal.archives-ouvertes.fr/hal-00304319

P. Smets, Decision making in the TBM: the necessity of the pignistic transformation, International Journal of Approximate Reasoning, vol.38, issue.2, pp.133-147, 2005.
DOI : 10.1016/j.ijar.2004.05.003

J. Ja?ray, Application of linear utility theory to belief functions, IPMU, pp.1-8, 1988.