Differential privacy: on the trade-off between utility and information leakage, 2011. ,
Pierpaolo Degano, and Catuscia Palamidessi. Differential privacy versus quantitative information flow, 2010. ,
Computing the Leakage of Information-Hiding Systems, Proc. of TACAS, pp.373-389, 2010. ,
DOI : 10.1007/978-3-642-12002-2_32
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, 2011. ,
DOI : 10.1109/CSF.2011.20
Asymptotic information leakage under one-try attacks, Proc. of FOSSACS, pp.396-410, 2011. ,
Compositional Methods for Information-Hiding, Proc. of FOSSACS, pp.443-457, 2008. ,
DOI : 10.1007/978-3-540-78499-9_31
URL : https://hal.archives-ouvertes.fr/hal-01006384
Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Probability of Error in Information-Hiding Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.341-354, 2007. ,
DOI : 10.1109/CSF.2007.27
URL : https://hal.archives-ouvertes.fr/inria-00200957
Quantification of integrity, 2011. ,
DOI : 10.1109/csf.2010.10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.2249
Differential Privacy, Automata, Languages and Programming, 33rd Int. Colloquium Proc., Part II, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Differential Privacy in New Settings, Proc. of the Twenty- First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp.174-183, 2010. ,
DOI : 10.1137/1.9781611973075.16
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009. ,
DOI : 10.1145/1536414.1536466
Universally utilitymaximizing privacy mechanisms, Proc. of the 41st annual ACM symposium on Theory of computing, STOC '09, pp.351-360, 2009. ,
DOI : 10.1145/1536414.1536464
URL : http://arxiv.org/abs/0811.2841
Applied Quantitative Information Flow and Statistical Databases, Proc. of the Int. Workshop on Formal Aspects in Security and Trust, pp.96-110, 2009. ,
DOI : 10.1007/978-3-642-12459-4_8
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010. ,
DOI : 10.1109/CSF.2010.11
Compositional Closure for Bayes Risk in Probabilistic Noninterference, Proc. of ICALP, pp.223-235, 2010. ,
DOI : 10.1007/978-3-642-14162-1_19
On Measures of Entropy and Information, Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1961. ,
On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380