C. Cachin, Entropy Measures and Unconditional Security in Cryptography, 1997.

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008.
DOI : 10.3233/JCS-2008-0333

URL : https://hal.archives-ouvertes.fr/inria-00349224

D. Clark, S. Hunt, and P. Malacaria, Quantitative Information Flow, Relations and Polymorphic Types, Special Issue on Lambda-calculus, type theory and natural language 18, pp.181-199, 2005.
DOI : 10.1093/logcom/exi009

URL : http://logcom.oxfordjournals.org/cgi/content/short/15/2/181

T. M. Cover and J. A. Thomas, Elements of Information Theory, 1991.

Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008.
DOI : 10.1137/060651380

URL : http://arxiv.org/abs/cs/0602007

P. Malacaria, Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007.

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008.
DOI : 10.1145/1375696.1375713

I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller, Covert channels and anonymizing networks, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.79-88, 2003.
DOI : 10.1145/1005140.1005153

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

I. S. Moskowitz, R. E. Newman, and P. F. Syverson, Quasi-anonymous channels, CNIS, pp.126-131, 2003.

A. Rény, On measures of entropy and information, Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1960.

G. Smith, Adversaries and Information Leaks (Tutorial), Proceedings of the Third Symposium on Trustworthy Global Computing, pp.383-400, 2007.
DOI : 10.1007/978-3-540-78663-4_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Smith, On the Foundations of Quantitative Information Flow, Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures, pp.288-302, 2009.
DOI : 10.1137/060651380

Y. Zhu and R. Bettati, Anonymity vs. information leakage in anonymity systems, Proc. of ICDCS (2005), pp.514-524