On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks, IFIPTM, volume 430 of IFIP Advances in Information and Communication Technology, pp.205-212 ,
DOI : 10.1007/978-3-662-43813-8_14
URL : https://hal.archives-ouvertes.fr/hal-01381689
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999. ,
DOI : 10.1145/266420.266432
Information hiding in probabilistic concurrent systems, Theoretical Computer Science, vol.412, issue.28, pp.3072-3089, 2011. ,
DOI : 10.1016/j.tcs.2011.02.045
Computing the leakage of informationhiding systems, Proc. of TACAS, pp.373-389, 2010. ,
Computing Behavioral Distances, Compositionally, Proc. MFCS'13, pp.74-85, 2013. ,
DOI : 10.1007/978-3-642-40313-2_9
On-the-Fly Exact Computation of Bisimilarity Distances, TACAS, pp.1-15 ,
DOI : 10.1007/978-3-642-36742-7_1
Compositional methods for informationhiding, Proc. of FOSSACS, pp.443-457, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01006384
Verified computational differential privacy with applications to smart metering, CSF, pp.287-301, 2013. ,
Process algebra for synchronous communication Information and Control Probabilistic relational reasoning for differential privacy, Proc. of POPL, pp.109-137, 1984. ,
Quantifying information leakage in process calculi, Automata, Languages and Programming, 33rd Int. Colloquium Proc., Part II, pp.119-131, 2006. ,
Probabilistic Anonymity, Proc. of CONCUR, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Axiomatizations for Probabilistic Bisimulation, Proc. of ICALP, pp.370-381, 2001. ,
DOI : 10.1007/3-540-48224-5_31
Approximating a Behavioural Pseudometric Without Discount for Probabilistic Systems, Foundations of Software Science and Computational Structures, pp.123-137, 2007. ,
DOI : 10.1007/978-3-540-71389-0_10
Proces algebra, volume 18 of Cambridge tracts in theoretical computer science, 1990. ,
Andrés, Nicolás Emilio Bordenabe, and Catuscia Palamidessi. Broadening the scope of differential privacy using metrics ,
Taskstructured probabilistic i/o automata, Proc. of WODES, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00080681
Algorithms for Game Metrics, FSTTCS Leibniz-Zentrum fuer Informatik, pp.107-118, 2008. ,
DOI : 10.2168/LMCS-6(3:13)2010
Measuring Anonymity, ISPEC, pp.183-194, 2009. ,
DOI : 10.1007/3-540-36467-6_9
Generalized bisimulation met- Bibliography rics [Cha88] David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability, Proc. of CONCUR, pp.32-4665, 1988. ,
A crash course on the lebesgue integral and measure theory, 2008. ,
Quantitative information flow, relations and polymorphic types Bisimulation for demonic schedulers, CNP09] Konstantinon Chatzikokolakis Proc. of FOSSACS, pp.181-199, 2005. ,
Probable innocence revisited, Theoretical Computer Science, vol.367, issue.1-2, pp.123-138, 2006. ,
DOI : 10.1016/j.tcs.2006.08.033
URL : https://hal.archives-ouvertes.fr/inria-00201109
Making random choices invisible to the scheduler, Information and Computation, vol.208, issue.6, pp.694-715, 2010. ,
DOI : 10.1016/j.ic.2009.06.006
URL : https://hal.archives-ouvertes.fr/inria-00424860
Basis Function Discovery Using Spectral Clustering and Bisimulation Metrics, AAAI, pp.85-99, 2012. ,
DOI : 10.1007/978-3-642-28499-1_6
Compositional methods for informationhiding ,
URL : https://hal.archives-ouvertes.fr/hal-01006384
Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proc. of DIAU, pp.44-66, 2000. ,
DOI : 10.1007/3-540-44702-4_4
Elements of Information Theory, 1991. ,
On the Complexity of Computing Probabilistic Bisimilarity, FOSSACS, pp.437-451, 2012. ,
DOI : 10.1007/978-3-642-28729-9_29
Re 3 : relay reliability reputation for anonymity systems, ASIACCS, pp.63-74, 2014. ,
The Kantorovich Metric in Computer Science: A Brief Survey, Electronic Notes in Theoretical Computer Science, vol.253, issue.3, pp.73-82, 2009. ,
DOI : 10.1016/j.entcs.2009.10.006
New Bisimulation Semantics for Distributed Systems, In FORTE, vol.360, issue.1-3, pp.143-159, 2007. ,
DOI : 10.1016/j.tcs.2006.03.004
Axiomatizing bisimulation equivalences and metrics from probabilistic SOS rules, Proc. of FoSSaCS, pp.289-303, 2014. ,
Compositional reasoning for weighted Markov decision processes, Science of Computer Programming, vol.78, issue.12, pp.2537-2579, 2013. ,
DOI : 10.1016/j.scico.2013.02.009
The metric analogue of weak bisimulation for probabilistic processes, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science, pp.413-422, 2002. ,
DOI : 10.1109/LICS.2002.1029849
Metrics for labelled Markov processes, Theoretical Computer Science, vol.318, issue.3, pp.323-354, 2004. ,
DOI : 10.1016/j.tcs.2003.09.013
Our Data, Ourselves: Privacy Via Distributed Noise Generation, EUROCRYPT, pp.486-503, 2006. ,
DOI : 10.1007/11761679_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3527
Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009. ,
DOI : 10.1145/1536414.1536466
Approximate Analysis of Probabilistic Processes: Logic, Simulation and Games, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.264-273, 2008. ,
DOI : 10.1109/QEST.2008.42
The second-generation onion router, Proc. of the 13th USENIX Security Symposium, 2004. ,
Axiomatizations for probabilistic finite-state behaviors, Proc. of FOSSACS, pp.110-124, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00159682
Compositional Reasoning for Probabilistic Finite-State Behaviors, Processes, Terms and Cycles: Steps on the Road to Infinity, pp.309-337, 2005. ,
DOI : 10.1007/11601548_17
URL : https://hal.archives-ouvertes.fr/hal-00159683
Weak Probabilistic Anonymity, Proc. of the 3rd Int. Workshop on Security Issues in Concurrency (SecCo), pp.55-76, 2007. ,
DOI : 10.1016/j.entcs.2005.05.047
URL : https://hal.archives-ouvertes.fr/hal-00159688
Measuring Anonymity with Relative Entropy, Proc. of the 4th Int. Worshop on Formal Aspects in Security and Trust, pp.65-79, 2006. ,
DOI : 10.1007/978-3-540-75227-1_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.1531
Differential Privacy, Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Proceedings, Part II, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
Classification of security properties (part i: Information flow), FOSAD, pp.331-396, 2000. ,
Linear dependent types for differential privacy, POPL, pp.357-370, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00909340
A calculus for costed computations, Logical Methods in Computer Science, vol.7, issue.1, 2011. ,
DOI : 10.2168/LMCS-7(1:7)2011
A calculus for communicating systems with time and probabitilies, Proceedings of the Real-Time Systems Symposium -1990, pp.278-287, 1990. ,
Proof systems for message-passing process algebras, In CONCUR LNCS, vol.715, pp.202-216, 1993. ,
Anonymity and information hiding in multiagent systems, J. of Comp. Security, vol.13, issue.3, pp.483-512, 2005. ,
Communicating Sequential Processes, 1985. ,
Probable innocence in the presence of independent knowledge Workshop on Formal Aspects in Security and Trust Lira: Lightweight incentivized routing for anonymity, Postproceedings of the 6th Int NDSS, pp.141-156, 2010. ,
Equivalences, congruences, and complete axiomatizations for probabilistic processes, Proc. of CONCUR, pp.367-383, 1990. ,
DOI : 10.1007/BFb0039071
Amortised Bisimulations, FORTE, pp.320-334, 2005. ,
DOI : 10.1007/3-540-10235-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.6835
How to take the dual of a linear program, 2008. ,
A process algebra manipulator. Formal Methods in System Design, pp.243-259, 1995. ,
Bisimulation through probabilistic testing, Proceedings of the 16th ACM Symposium on Principles of Programming Languages (POPL), pp.344-352, 1989. ,
Bisimulation through probabilistic testing, Inf. and Comp, vol.94, issue.1, pp.1-28, 1991. ,
A Proof System for Timed Automata, FoSSaCS, pp.208-222 ,
DOI : 10.1007/3-540-46432-8_14
Assessing security threats of looping constructs [McS09] Frank McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis, Proc. of POPL Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp.225-235, 2007. ,
Privacy: Theory meets practice on the map, Proc. of ICDE, pp.277-286, 2008. ,
Measuring Information Flow in Reactive Processes, ICICS, pp.211-225, 2009. ,
DOI : 10.1007/978-3-642-11145-7_17
Building Incentives into Tor, Lecture Notes in Computer Science, vol.6052, pp.238-256, 2010. ,
DOI : 10.1007/978-3-642-14577-3_19
When does a metric generate convex balls? Technical report, 1991. ,
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
URL : http://arxiv.org/abs/0903.3276
Distance makes the types grow stronger: a calculus for differential privacy, Proceeding of the 15th ACM SIGPLAN international conference on Functional programming (ICFP), pp.157-168, 2010. ,
Crowds: anonymity for Web transactions, ACM Trans. on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
Process algebra and non-interference, Journal of Computer Security, vol.9, issue.12, pp.75-103, 2001. ,
Airavat: security and privacy for MapReduce, Proc. of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp.297-312, 2010. ,
Modeling and Verification of Randomized Distributed Real-Time Systems, 1995. ,
Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols, Proc. of the Fifth Int. Symposium on Trustworthly Global Computing, pp.88-102, 2010. ,
DOI : 10.1007/978-3-642-15640-3_7
Anonymous connections and onion routing, Proc. of S&P, pp.44-54, 1997. ,
Trust in Anonymity Networks, Proceedings of CONCUR, pp.48-70, 1994. ,
DOI : 10.1007/978-3-642-15375-4_5
URL : https://hal.archives-ouvertes.fr/hal-00760437
Probabilistic simulations for probabilistic processes, Nordic Journal of Computing, vol.2, issue.2, pp.250-273, 1995. ,
Probabilistic noninterference through weak probabilistic bisimulation, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.3-13, 2003. ,
DOI : 10.1109/CSFW.2003.1212701
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.7841
Efficient, differentially private point estimators . arXiv preprint, 2008. ,
On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Probabilistic Automata: System Types, Parallel Composition and Comparison, Validation of Stochastic Systems: A Guide to Current Research, pp.1-43, 2004. ,
DOI : 10.1007/978-3-540-24611-4_1
A lattice-theoretical fixpoint theorem and its applications, Pacific Journal of Mathematics, vol.5, issue.2, pp.285-309, 1955. ,
DOI : 10.2140/pjm.1955.5.285
Computing Distances between Probabilistic Automata, QAPL, pp.148-162, 2011. ,
DOI : 10.4204/EPTCS.57.11
URL : http://doi.org/10.4204/eptcs.57.11
Approximating stochastic biochemical processes with Wasserstein pseudometrics, IET Systems Biology, vol.4, issue.3, pp.193-211, 2010. ,
DOI : 10.1049/iet-syb.2009.0039
Formal verification of differential privacy for interactive systems (extended abstract), Electron. Notes Theor. Comput. Sci, vol.276, pp.61-79, 2011. ,
An Algorithm for Quantitative Verification of Probabilistic Transition Systems ,
DOI : 10.1007/3-540-44685-0_23
Towards quantitative verification of probabilistic transition systems [vBW05] Franck van Breugel and James Worrell. A behavioural pseudometric for probabilistic transition systems, Proc. of CONCUR'01 Proc. of ICALP, pp.336-350, 2001. ,
Reactive, generative, and stratified models of probabilistic processes, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, pp.59-80, 1995. ,
DOI : 10.1109/LICS.1990.113740
Metrics for Differential Privacy in Concurrent Systems, Proc. of FORTE, pp.199-215 ,
DOI : 10.1007/978-3-662-43613-4_13
URL : https://hal.archives-ouvertes.fr/hal-00879140
Privacy-preserving process constructors, 2014. ,
Complete Proof Systems for Amortised Probabilistic Bisimulations, Journal of Computer Science and Technology, vol.2, issue.2, 2014. ,
DOI : 10.1007/s11390-016-1628-4
Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus, TGC, pp.198-212, 2012. ,
DOI : 10.1007/978-3-642-41157-1_13
URL : https://hal.archives-ouvertes.fr/hal-00691284
A Game-Theoretic Analysis of Cooperation in Anonymity Networks ,
DOI : 10.1007/978-3-642-28641-4_15
URL : https://hal.archives-ouvertes.fr/hal-00760445