Compositional Methods for Information-Hiding, FoSSaCS, pp.443-457, 2008. ,
DOI : 10.1007/978-3-540-78499-9_31
URL : https://hal.archives-ouvertes.fr/inria-00349227
Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006. ,
DOI : 10.1016/j.tcs.2006.08.033
URL : https://hal.archives-ouvertes.fr/inria-00201109
Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007. ,
DOI : 10.1109/CSF.2007.27
URL : https://hal.archives-ouvertes.fr/inria-00200957
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008. ,
DOI : 10.3233/JCS-2008-0333
URL : https://hal.archives-ouvertes.fr/inria-00349224
Quantitative analysis of leakage for multi-threaded programs, Proceedings of the 2007 workshop on Programming languages and analysis for security , PLAS '07, pp.31-40, 2007. ,
DOI : 10.1145/1255329.1255335
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Belief in information flow, CSFW, pp.31-45, 2005. ,
Measuring Anonymity with Relative Entropy, Formal Aspects in Security and Trust, pp.65-79, 2006. ,
DOI : 10.1007/978-3-540-75227-1_5
Attacking Unlinkability: The Importance of Context, Privacy Enhancing Technologies, pp.1-16, 2007. ,
DOI : 10.1007/978-3-540-75551-7_1
Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005. ,
Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005. ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Lagrange multipliers and maximum information leakage in different observational models. In´UlfarIn´ In´Ulfar Erlingsson and Marco Pistoia, PLAS, pp.135-146, 2008. ,
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
Towards an Information Theoretic Metric for Anonymity, Privacy Enhancing Technologies, pp.41-53, 2002. ,
DOI : 10.1007/3-540-36467-6_4
Measuring relationship anonymity in mix networks, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, pp.59-62, 2006. ,
DOI : 10.1145/1179601.1179611
On the Foundations of Quantitative Information Flow, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures, pp.288-302, 2009. ,
DOI : 10.1137/060651380