Reactive modules. Formal Methods in System Design, pp.7-48, 1999. ,
DOI : 10.1109/lics.1996.561320
Model Checking Continuous-Time Markov Chains by Transient Analysis, Proceedings of the 12th Conference on Computer Aided Verification, pp.358-372, 2000. ,
DOI : 10.1007/10722167_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.208
Model checking for a probabilistic branching time logic with fairness, Distributed Computing, vol.11, issue.3, pp.125-155, 1998. ,
DOI : 10.1007/s004460050046
Probabilistic anonymity INRIA Futurs and LIX Submitted for publication, 2005. ,
Model checking of probabilistic and nondeterministic systems, Proceedings of the 15th Conference on Foundations of Software Technology and Theoretical Computer Science, pp.499-513, 1995. ,
DOI : 10.1007/3-540-60692-0_70
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Anonymity and information hiding in multiagent systems, Proc. of the 16th IEEE Computer Security Foundations Workshop, pp.75-88, 2003. ,
A logic for reasoning about time and reliability, Formal Aspects of Computing, vol.2, issue.1, pp.512-535, 1994. ,
DOI : 10.1007/BF01211866
PRISM: Probabilistic Symbolic Model Checker, Proceedings of the 12th Conference on Computer Performance Evaluation, Modelling Techniques and Tools, pp.200-204, 2002. ,
DOI : 10.1007/3-540-46029-2_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.2142
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
Modelling and Analysis of Security Protocols, 2001. ,
CSP and anonymity, Proc. of the European Symposium on Research in Computer Security (ESORICS), pp.198-218, 1996. ,
DOI : 10.1007/3-540-61770-1_38
Probabilistic simulations for probabilistic processes An extended abstract, Proceedings of CONCUR '94, pp.250-273, 1995. ,
Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.44-54, 1997. ,
DOI : 10.1109/SECPRI.1997.601314
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3883