M. S. Alvim, M. E. Andrés, and C. Palamidessi, Information Flow in Interactive Systems, 2010.
DOI : 10.1007/978-3-642-15375-4_8

URL : https://hal.archives-ouvertes.fr/inria-00479672

M. E. Andrés, C. Palamidessi, P. Van-rossum, and G. Smith, Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010.
DOI : 10.1007/978-3-642-12002-2_32

A. Bohannon, B. C. Pierce, V. Sjöberg, S. Weirich, and S. Zdancewic, Reactive noninterference, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.79-90, 2009.
DOI : 10.1145/1653662.1653673

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

D. Clark, S. Hunt, and P. Malacaria, Quantified Interference for a While Language, Proc. of QAPL 2004, pp.149-166, 2005.
DOI : 10.1016/j.entcs.2004.01.018

T. M. Cover and J. A. Thomas, Elements of Information Theory, 1991.

Y. Deng, T. Chothia, C. Palamidessi, and J. Pang, Metrics for Action-labelled Quantitative Transition Systems, Proc. of QAPL, pp.79-96, 2006.
DOI : 10.1016/j.entcs.2005.10.033

URL : https://hal.archives-ouvertes.fr/hal-00159689

J. Desharnais, R. Jagadeesan, V. Gupta, and P. Panangaden, The metric analogue of weak bisimulation for probabilistic processes, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science, pp.413-422, 2002.
DOI : 10.1109/LICS.2002.1029849

L. Kantorovich, On the transfer of masses (in Russian), Doklady Akademii Nauk Translated in Management Science, vol.5, issue.51, pp.1-41, 1942.

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

J. L. Massey, Causality, feedback and directed information, Proc. of the 1990 Intl. Symposium on Information Theory and its Applications, 1990.

R. Segala, Modeling and Verification of Randomized Distributed Real-Time Systems, 1995.

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380

F. Stajano and R. J. Anderson, The Cocaine Auction Protocol: On the Power of Anonymous Broadcast, Information Hiding, pp.434-447, 1999.
DOI : 10.1007/10719724_30

S. Subramanian, Design and verification of a secure electronic auction protocol, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281), pp.204-210, 1998.
DOI : 10.1109/RELDIS.1998.740497

S. Tatikonda and S. K. Mitter, The Capacity of Channels With Feedback, IEEE Transactions on Information Theory, vol.55, issue.1, pp.323-349, 2009.
DOI : 10.1109/TIT.2008.2008147

F. Van-breugel and J. Worrell, Towards Quantitative Verification of Probabilistic Transition Systems, Proc. of ICALP, pp.421-432, 2001.
DOI : 10.1007/3-540-48224-5_35

W. Vickrey, COUNTERSPECULATION, AUCTIONS, AND COMPETITIVE SEALED TENDERS, The Journal of Finance, vol.16, issue.1, pp.8-37, 1961.
DOI : 10.1111/j.1540-6261.1961.tb02789.x