C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating noise to sensitivity in private data analysis, Proc. of TCC, ser. LNCS, vol.3876, pp.265-284, 2006.
DOI : 10.29012/jpc.v7i3.405

URL : https://journalprivacyconfidentiality.org/index.php/jpc/article/download/405/388

J. C. Duchi, M. I. Jordan, and M. J. Wainwright, Local privacy and statistical minimax rates, Proc. of FOCS, pp.429-438, 2013.
DOI : 10.1109/allerton.2013.6736718

K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi, Broadening the scope of Differential Privacy using metrics, Proc. of PETS, ser. LNCS, vol.7981, pp.82-102, 2013.
DOI : 10.1007/978-3-642-39077-7_5

URL : https://hal.archives-ouvertes.fr/hal-00767210

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proc. of CCS, pp.286-296, 2007.

G. Smith, On the foundations of quantitative information flow, Proc. of FOSSACS, ser. LNCS, vol.5504, pp.288-302, 2009.

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring information leakage using generalized gain functions, Proc. of CSF, pp.265-279, 2012.
DOI : 10.1109/csf.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

A. Mciver, C. Morgan, G. Smith, B. Espinoza, and L. Meinicke, Abstract channels and their robust information-leakage ordering, Proc. of POST, ser. LNCS, vol.8414, pp.83-102, 2014.

D. Kifer and A. Machanavajjhala, Pufferfish: A framework for mathematical privacy definitions, ACM Trans. on Database Systems, vol.39, issue.1, pp.1-3, 2014.

M. S. Alvim, K. Chatzikokolakis, A. Mciver, C. Morgan, C. Palamidessi et al., Axioms for information leakage, Proc. of CSF, pp.77-92, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330414

H. Yasuoka and T. Terauchi, Quantitative information flow -verification hardness and possibilities, Proc. of CSF, pp.15-27, 2010.

P. Malacaria, Algebraic foundations for quantitative information flow, Mathematical Structures in Computer Science, vol.25, issue.2, pp.404-428, 2015.

D. Clark, S. Hunt, and P. Malacaria, Quantitative information flow, relations and polymorphic types, J. of Logic and Computation, vol.18, issue.2, pp.181-199, 2005.

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

J. Landauer and T. Redmond, A lattice of information, Proc. Computer Security Foundations Workshop VI, pp.65-70, 1993.

J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan et al., Differential privacy: An economic method for choosing epsilon, Proc. of CSF, pp.398-410, 2014.

A. Ghosh and A. Roth, Selling privacy at auction, Proceedings of the 12th ACM Conf. on Electronic Commerce, ser. EC '11, pp.199-208, 2011.

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability: differential privacy for location-based systems, Proc. of CCS, pp.901-914, 2013.

G. Barthe and B. Köpf, Information-theoretic bounds for differentially private mechanisms, Proc. of CSF. IEEE, pp.191-204, 2011.

S. , P. Kasiviswanathan, and A. Smith, On the 'semantics' of differential privacy: A bayesian formulation, Journal of Privacy and Confidentiality, vol.6, 2008.

H. R. Tiwary, On the hardness of computing intersection, union and minkowski sum of polytopes, Discrete & Computational Geometry, vol.40, issue.3, pp.469-479, 2008.

K. Fukuda, T. M. Liebling, and C. Lütolf, Extended convex hull, Comput. Geom, vol.20, pp.13-23, 2000.

D. P. Bertsekas, Convex optimization theory, 2009.