S. Mário, M. E. Alvim, K. Andrés, P. Chatzikokolakis, C. Degano et al., Differential privacy: on the trade-off between utility and information leakage, 2011.

S. Mário, K. Alvim, and . Chatzikokolakis, Pierpaolo Degano, and Catuscia Palamidessi. Differential privacy versus quantitative information flow, 2010.

M. E. Andrés, C. Palamidessi, G. Peter-van-rossum, and . Smith, Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010.
DOI : 10.1007/978-3-642-12002-2_32

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, 2011.
DOI : 10.1109/CSF.2011.20

M. Boreale, F. Pampaloni, and M. Paolini, Asymptotic information leakage under one-try attacks, Proc. of FOSSACS, pp.396-410, 2011.

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Compositional Methods for Information-Hiding, Proc. of FOSSACS, pp.443-457, 2008.
DOI : 10.1007/978-3-540-78499-9_31

URL : https://hal.archives-ouvertes.fr/hal-01006384

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007.
DOI : 10.1109/CSF.2007.27

URL : https://hal.archives-ouvertes.fr/inria-00200957

M. R. Clarkson and F. B. Schneider, Quantification of integrity, 2011.
DOI : 10.1109/csf.2010.10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Dwork, Differential Privacy, Automata, Languages and Programming, 33rd Int. Colloquium Proc., Part II, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, Differential Privacy in New Settings, Proc. of the Twenty- First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp.174-183, 2010.
DOI : 10.1137/1.9781611973075.16

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011.
DOI : 10.1145/1866739.1866758

C. Dwork and J. Lei, Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009.
DOI : 10.1145/1536414.1536466

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utilitymaximizing privacy mechanisms, Proc. of the 41st annual ACM symposium on Theory of computing, STOC '09, pp.351-360, 2009.
DOI : 10.1145/1536414.1536464

URL : http://arxiv.org/abs/0811.2841

J. Heusser and P. Malacaria, Applied Quantitative Information Flow and Statistical Databases, Proc. of the Int. Workshop on Formal Aspects in Security and Trust, pp.96-110, 2009.
DOI : 10.1007/978-3-642-12459-4_8

B. Köpf and G. Smith, Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010.
DOI : 10.1109/CSF.2010.11

A. Mciver, L. Meinicke, and C. Morgan, Compositional Closure for Bayes Risk in Probabilistic Noninterference, Proc. of ICALP, pp.223-235, 2010.
DOI : 10.1007/978-3-642-14162-1_19

A. Rényi, On Measures of Entropy and Information, Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1961.

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380