CSP and anonymity, Proc. of the European Symposium on Research in Computer Security (ESORICS), pp.198-218, 1996. ,
DOI : 10.1007/3-540-61770-1_38
Modelling and Analysis of Security Protocols, 2001. ,
Group Principals and the Formalization of Anonymity, World Congress on Formal Methods, issue.1, pp.814-833, 1999. ,
DOI : 10.1007/3-540-48119-2_45
Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005. ,
DOI : 10.3233/JCS-2005-13305
Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004. ,
DOI : 10.3233/JCS-2004-12102
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002. ,
DOI : 10.1142/S021848850200165X
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Probabilistic Anonymity, Proceedings of CONCUR, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006. ,
DOI : 10.1016/j.tcs.2006.08.033
URL : https://hal.archives-ouvertes.fr/inria-00201109
Towards an Information Theoretic Metric for Anonymity, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, pp.41-53, 2002. ,
DOI : 10.1007/3-540-36467-6_4
Towards Measuring Anonymity, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, pp.54-68, 2002. ,
DOI : 10.1007/3-540-36467-6_5
Covert channels and anonymizing networks, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.79-88, 2003. ,
DOI : 10.1145/1005140.1005153
Quasi-anonymous channels, CNIS, pp.126-131, 2003. ,
Anonymity vs. information leakage in anonymity systems, Proc. of ICDCS, pp.514-524, 2005. ,
Belief in Information Flow, 18th IEEE Computer Security Foundations Workshop (CSFW'05) ,
DOI : 10.1109/CSFW.2005.10
Measuring Anonymity with Relative Entropy, Proceeddings of the of the 4th International Workshop on Formal Aspects in Security and Trust, pp.65-79, 2006. ,
DOI : 10.1007/978-3-540-75227-1_5
Security models and information flow, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.180-189, 1990. ,
DOI : 10.1109/RISP.1990.63849
Toward a mathematical foundation for information flow security, Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP '91), IEEE, pp.21-35, 1991. ,
Quantitative Analysis of the Leakage of Confidential Data, Proc. of QAPL 2001, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
Quantified Interference for a While Language, Proc. of QAPL 2004, pp.149-166, 2005. ,
DOI : 10.1016/j.entcs.2004.01.018
Quantifying information flow, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.18-31, 2002. ,
DOI : 10.1109/CSFW.2002.1021804
Authentication theory and hypothesis testing, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1350-1356, 2000. ,
DOI : 10.1109/18.850674
Approximate non-interference, Journal of Computer Security, vol.12, issue.1, pp.37-82, 2004. ,
DOI : 10.3233/JCS-2004-12103
Measuring the confinement of probabilistic systems, Theoretical Computer Science, vol.340, issue.1, pp.3-56, 2005. ,
DOI : 10.1016/j.tcs.2005.03.002
Probabilistic noninterference for multi-threaded programs, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.200-214, 2000. ,
DOI : 10.1109/CSFW.2000.856937
Weak Probabilistic Anonymity, Proceedings of the 3rd International Workshop on Security Issues in Concurrency (SecCo), pp.55-76, 2007. ,
DOI : 10.1016/j.entcs.2005.05.047
URL : https://hal.archives-ouvertes.fr/hal-00159688
PRISM 2.0: a tool for probabilistic model checking, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings., pp.322-323, 2004. ,
DOI : 10.1109/QEST.2004.1348048
Probabilistic analysis of anonymity, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.119-128, 2002. ,
DOI : 10.1109/CSFW.2002.1021811
An analysis of the degradation of anonymous protocols, ISOC Network and Distributed System Security Symposium (NDSS), 2002. ,
Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007. ,
DOI : 10.1109/CSF.2007.27
URL : https://hal.archives-ouvertes.fr/inria-00200957