C. Braun, K. Chatzikokolakis, and C. Palamidessi, Compositional Methods for Information-Hiding, FoSSaCS, pp.443-457, 2008.
DOI : 10.1007/978-3-540-78499-9_31

URL : https://hal.archives-ouvertes.fr/inria-00349227

K. Chatzikokolakis and C. Palamidessi, Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006.
DOI : 10.1016/j.tcs.2006.08.033

URL : https://hal.archives-ouvertes.fr/inria-00201109

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007.
DOI : 10.1109/CSF.2007.27

URL : https://hal.archives-ouvertes.fr/inria-00200957

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008.
DOI : 10.3233/JCS-2008-0333

URL : https://hal.archives-ouvertes.fr/inria-00349224

H. Chen and P. Malacaria, Quantitative analysis of leakage for multi-threaded programs, Proceedings of the 2007 workshop on Programming languages and analysis for security , PLAS '07, pp.31-40, 2007.
DOI : 10.1145/1255329.1255335

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.
DOI : 10.3233/JCS-2007-15302

R. Michael, A. C. Clarkson, F. B. Myers, and . Schneider, Belief in information flow, CSFW, pp.31-45, 2005.

Y. Deng, J. Pang, and P. Wu-0002, Measuring Anonymity with Relative Entropy, Formal Aspects in Security and Trust, pp.65-79, 2006.
DOI : 10.1007/978-3-540-75227-1_5

M. Franz, B. Meyer, and A. Pashalidis, Attacking Unlinkability: The Importance of Context, Privacy Enhancing Technologies, pp.1-16, 2007.
DOI : 10.1007/978-3-540-75551-7_1

Y. Joseph, K. R. Halpern, and . Neill, Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005.

Y. Joseph, K. R. Halpern, and . Neill, Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005.

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in different observational models. In´UlfarIn´ In´Ulfar Erlingsson and Marco Pistoia, PLAS, pp.135-146, 2008.

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

A. Serjantov and G. Danezis, Towards an Information Theoretic Metric for Anonymity, Privacy Enhancing Technologies, pp.41-53, 2002.
DOI : 10.1007/3-540-36467-6_4

V. Shmatikov and M. Wang, Measuring relationship anonymity in mix networks, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, pp.59-62, 2006.
DOI : 10.1145/1179601.1179611

G. Smith, On the Foundations of Quantitative Information Flow, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures, pp.288-302, 2009.
DOI : 10.1137/060651380