Quantitative information flow, relations and polymorphic types, J. of Logic and Computation, vol.18, issue.2, pp.181-199, 2005. ,
A mathematical theory of communication, Bell System Technical Journal, vol.27, pp.625-56, 1948. ,
, Proceedings of the IEEE Int. Symposium on Information Theory, p.204, 1994.
On the foundations of quantitative information flow, Proc. of FOSSACS, vol.5504, pp.288-302, 2009. ,
Measuring information leakage using generalized gain functions, Proc. of CSF, pp.265-279, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00734044
Compositional Closure for Bayes Risk in Probabilistic Noninterference, Proc. of ICALP, vol.6199, pp.223-235, 2010. ,
Mathematical Foundations of Information Theory, 1957. ,
, Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1961.
Information measures in statistical privacy and data processing applications, TKDD, vol.9, issue.4, p.28, 2015. ,
Axioms for information leakage, Proc. of CSF, pp.77-92, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01330414
On the Bayes risk in information-hiding protocols, J. of Comp. Security, vol.16, issue.5, pp.531-571, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00349224
Additive and multiplicative notions of leakage, and their capacities, Proc. of CSF, pp.308-322, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00989462
When not all bits are equal: Worth-based information flow, Proc. 3rd Conference on Principles of Security and Trust, pp.120-139, 2014. ,
Abstract channels and their robust information-leakage ordering, Proc. of POST, vol.8414, pp.83-102, 2014. ,
, Convex analysis, 1970.
Online learning and online convex optimization, Foundations and Trends in, Machine Learning, vol.4, issue.2, pp.107-194, 2012. ,
Quantitative information flow under generic leakage functions and adaptive adversaries, Proc. of FORTE, vol.8461, pp.166-181, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01398015
Quantitative information flow under generic leakage functions and adaptive adversaries, Logical Methods in Computer Science, vol.11, issue.4 ,
URL : https://hal.archives-ouvertes.fr/hal-01398015
Security models and information flow, Proc. of S&P, pp.180-189, 1990. ,
Secure information flow in a multi-threaded imperative language, Proc. of POPL, POPL '98, pp.355-364, 1998. ,
, A categorical approach to probability theory, vol.915, pp.68-85, 1981.
A Kantorovich-monadic powerdomain for information hiding, with probability and nondeterminism, Proc. LiCS, 2012. ,
A monadic model for computations that leak secrets, 2015. ,
Hidden-markov program algebra with iteration, Mathematical Structures in Computer Science, vol.25, issue.2, pp.320-360, 2015. ,
The metric monad for probabilistic nondeterminism, 2005. ,
Elements of Information Theory, 2006. ,
Differential privacy, Proc. of ICALP, vol.4052, pp.1-12, 2006. ,
Axiomatic characterizations of information measures, Entropy, vol.10, issue.3, p.261, 2008. ,
, , 1983.
Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007. ,
Anonymity protocols as noisy channels, Inf. and Comp, vol.206, issue.2-4, pp.378-401, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00201110
Lagrange multipliers and maximum information leakage in different observational models, Proc. of PLAS, ACM, pp.135-146, 2008. ,
Quasi-anonymous channels, Proc. of CNIS 2003, IASTED, pp.126-131, 2003. ,
Covert channels and anonymizing networks, Proc. of WPES, pp.79-88, 2003. ,
Information Flow in Interactive Systems, J. of Comp. Security, vol.1, issue.20, pp.3-50, 2012. ,
URL : https://hal.archives-ouvertes.fr/inria-00479672
Towards an axiomatization of statistical privacy and utility, Proc. of PODS, pp.147-158, 2010. ,
Reasoning about privacy using axioms, Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers, ACSCC 2012, pp.975-979, 2012. ,
An axiomatic view of statistical privacy and utility, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.5-49, 2012. ,