Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.44-54, 1997. ,
DOI : 10.1109/SECPRI.1997.601314
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3883
Freenet: A distributed anonymous information storage and retrieval system., in: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability Lecture Notes in Computer Science, pp.44-66, 2000. ,
DOI : 10.1007/3-540-44702-4_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919
Group Principals and the Formalization of Anonymity, World Congress on Formal Methods, issue.1, pp.814-833, 1999. ,
DOI : 10.1007/3-540-48119-2_45
Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005. ,
DOI : 10.3233/JCS-2005-13305
URL : http://doi.org/10.3233/jcs-2005-13305
Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004. ,
DOI : 10.3233/JCS-2004-12102
URL : http://doi.org/10.3233/jcs-2004-12102
Modelling and Analysis of Security Protocols, 2001. ,
Probabilistic Anonymity, Proceedings of CONCUR, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006. ,
DOI : 10.1016/j.tcs.2006.08.033
URL : https://hal.archives-ouvertes.fr/inria-00201109
Anonymity vs. information leakage in anonymity systems, Proc. of ICDCS, pp.514-524, 2005. ,
Quantitative Information Flow, Relations and Polymorphic Types, Special Issue on Lambda-calculus, type theory and natural language, pp.181-199, 2005. ,
DOI : 10.1093/logcom/exi009
URL : http://logcom.oxfordjournals.org/cgi/content/short/15/2/181
Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007. ,
Lagrange multipliers and maximum information leakage in di?erent observational models, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, pp.135-146, 2008. ,
DOI : 10.1145/1375696.1375713
Quasi-anonymous channels, CNIS, pp.126-131, 2003. ,
Covert channels and anonymizing networks, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.79-88, 2003. ,
DOI : 10.1145/1005140.1005153
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.7395
Anonymity protocols as noisy channels, Information and Computation, vol.206, pp.2-4, 2008. ,
DOI : 10.1007/978-3-540-75336-0_18
URL : https://hal.archives-ouvertes.fr/inria-00349225
Attacking Unlinkability: The Importance of Context, Privacy Enhancing Technologies, 7th International Symposium, PET 2007, pp.1-16, 2007. ,
DOI : 10.1007/978-3-540-75551-7_1
Belief in Information Flow, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.31-45, 2005. ,
DOI : 10.1109/CSFW.2005.10
Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009. ,
DOI : 10.3233/JCS-2009-0353
URL : http://doi.org/10.3233/jcs-2009-0353
Adversaries and Information Leaks (Tutorial), Proceedings of the Third Symposium on Trustworthy Global Computing, pp.383-400, 2007. ,
DOI : 10.1007/978-3-540-78663-4_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.6271
On the Foundations of Quantitative Information Flow, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures (FOS- SACS 2009), pp.288-302, 2009. ,
DOI : 10.1137/060651380
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279 ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Abstract Channels and Their Robust Information-Leakage Ordering, Proceedings of the Third International Conference on Principles of Security and Trust (POST), pp.83-102, 2014. ,
DOI : 10.1007/978-3-642-54792-8_5
Additive and Multiplicative Notions of Leakage, and Their Capacities, 2014 IEEE 27th Computer Security Foundations Symposium, pp.308-322, 2014. ,
DOI : 10.1109/CSF.2014.29
URL : https://hal.archives-ouvertes.fr/hal-00989462
Probable Innocence in the Presence of Independent Knowledge, Lecture Notes in Computer Science, vol.5983, pp.141-156, 2009. ,
DOI : 10.1007/978-3-642-12459-4_11
Reconciling Belief and Vulnerability in Information Flow, 2010 IEEE Symposium on Security and Privacy, pp.79-92, 2010. ,
DOI : 10.1109/SP.2010.13
URL : https://hal.archives-ouvertes.fr/inria-00548007
A Generalization of Bayesian Inference, Classic Works of the Dempster-Shafer Theory of Belief Functions of Studies in Fuzziness and Soft Computing, pp.73-104, 2008. ,
DOI : 10.1007/978-3-540-44792-4_4
A Mathematical Theory of Evidence, 1976. ,
Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994. ,
DOI : 10.1109/ISIT.1994.394764
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
Lagrange multipliers and maximum information leakage in di?erent observational models, pp.135-146, 2008. ,
DOI : 10.1145/1375696.1375713
An information-theoretic model for adaptive sidechannel attacks, ACM Conference on Computer and Communications Security, pp.286-296, 2007. ,
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3 ,
DOI : 10.1016/S1571-0661(04)00290-7
Belief semantics of authorization logic, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.561-572, 2013. ,
DOI : 10.1145/2508859.2516667
Quantification of integrity, Mathematical Structures in Computer Science, vol.25, issue.2, p.0960129513000595 ,
A Precise Information Flow Measure from Imprecise Probabilities, 2012 IEEE Sixth International Conference on Software Security and Reliability, pp.128-137, 2012. ,
DOI : 10.1109/SERE.2012.25
URL : http://arxiv.org/abs/1206.5487
Uncertainty and Information: Foundations of Generalized Information Theory, 2005. ,
DOI : 10.1002/0471755575
On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, 2008. ,
DOI : 10.3233/JCS-2008-0333
URL : https://hal.archives-ouvertes.fr/inria-00349224
Quantitative Notions of Leakage for One-try Attacks, Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Computing the amount of leakage in information-hiding systems, Tech. rep, 2009. ,
Computing information flow using symbolic model-checking, 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014 of LIPIcs, Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, pp.505-516, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01110118
Statistical Measurement of Information Leakage, Proceedings of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pp.390-404, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
Possibility theory, probability theory and multiplevalued logics: A clarification, Ann. Math. Artif. Intell, vol.32, pp.1-4, 2001. ,
DOI : 10.1007/3-540-45493-4_26
Book review, Information and Control, vol.4, issue.1, pp.81-83, 1984. ,
DOI : 10.1016/S0019-9958(61)80044-2
On the dempster-shafer framework and new combination rules, Information Sciences, vol.41, issue.2, pp.93-137, 1987. ,
DOI : 10.1016/0020-0255(87)90007-7
The transferable belief model, Classic Works of the Dempster-Shafer Theory of Belief Functions of Studies in Fuzziness and Soft Computing, pp.693-736, 2008. ,
DOI : 10.1016/0004-3702(94)90026-4
URL : https://hal.archives-ouvertes.fr/hal-01185821
Representation and combination of uncertainty with belief functions and possibility measures, Computational Intelligence, vol.5, issue.1, pp.244-264, 1988. ,
DOI : 10.1016/0165-0114(78)90029-5
Belief functions: The disjunctive rule of combination and the generalized Bayesian theorem, International Journal of Approximate Reasoning, vol.9, issue.1, pp.1-35, 1993. ,
DOI : 10.1016/0888-613X(93)90005-X
A new probabilistic transformation of belief mass assignment ,
URL : https://hal.archives-ouvertes.fr/hal-00304319
Decision making in the TBM: the necessity of the pignistic transformation, International Journal of Approximate Reasoning, vol.38, issue.2, pp.133-147, 2005. ,
DOI : 10.1016/j.ijar.2004.05.003
Application of linear utility theory to belief functions, IPMU, pp.1-8, 1988. ,