M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geoindistinguishability: differential privacy for location-based systems, Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp.901-914, 2013.

. N. Bordenabe, N. Chatzikokolakis, and C. Palamidessi, Optimal Geo-Indistinguishable Mechanisms for Location Privacy, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1145/2660267.2660345

URL : https://hal.archives-ouvertes.fr/hal-00950479

K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi, Broadening the Scope of Differential Privacy Using Metrics, PETS 2013, pp.82-102, 2013.
DOI : 10.1007/978-3-642-39077-7_5

URL : https://hal.archives-ouvertes.fr/hal-00767210

K. Chatzikokolakis, D. Gebler, C. Palamidessi, and L. Xu, Generalized Bisimulation Metrics, CONCUR 2014, pp.32-46, 2014.
DOI : 10.1007/978-3-662-44584-6_4

URL : https://hal.archives-ouvertes.fr/hal-01011471

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, A Predictive Differentially-Private Mechanism for Mobility Traces, PETS 2014, pp.21-41, 2014.
DOI : 10.1007/978-3-319-08506-7_2

URL : https://hal.archives-ouvertes.fr/hal-01011260

B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, Private information retrieval, Proceedings of 36th Annual Symposium on Foundations of Computer Science, pp.41-50, 1995.

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

URL : http://doi.org/10.3233/jcs-2009-0340

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: the second-generation onion router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004.

C. Dwork, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Differential Privacy, Part II, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011.
DOI : 10.1145/1866739.1866758

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.9141

C. Dwork and J. Lei, Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009.
DOI : 10.1145/1536414.1536466

A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006.
DOI : 10.1109/JSAC.2005.861395

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.7472

P. Samarati and L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract) Verifying Generalized Differential Privacy in Concurrent Systems XIII Contents On the Power of, Proceedings of the ACM SIGACT?SIGMOD?SIGART Symposium on Principles of Database Systems, p.188, 1998.

Y. Abd-alrahman, R. D. Nicola, and M. , Loreti Fencing Programs with Self-Invalidation and Self

D. Basile, P. Degano, and G. Ferrari, and Emilio Tuosto Multiparty Session Types Within a Canonical Binary Theory, and Beyond, p.74

L. Caires and J. A. , Pérez A Type Theory for Robust Failure Handling in Distributed Systems, p.96

Á. Hajdu, T. Tóth, and .. , András Vörös, and István Majzik A Theory for the Composition of Concurrent Processes, p.175

L. Henrio and E. M. , and Min Zhang Enforcing Availability in Failure-Aware Communicating Systems

A. Petrenko, O. N. Timo, and S. , Ramesh The Challenge of Typed Expressiveness in, p.239

C. Spaccasassi, V. Koutavas-simautogen-tool, and .. , Test Vector Generation from Large Scale MATLAB/Simulink Models