Hyperproperties, Journal of Computer Security, vol.18, issue.6, pp.1157-1210, 2010. ,
DOI : 10.3233/JCS-2009-0393
Preserving Secrecy Under Refinement, Proc. of the 33rd Intl. Colloquium on Automata, Languages and Programming (ICALP'06, pp.107-118, 2006. ,
DOI : 10.1007/11787006_10
Decidability of Opacity with Non-Atomic Keys, Proc. 2nd Workshop on Formal Aspects in Security and Trust of Intl. Federation for Information Processing, pp.71-84, 2005. ,
DOI : 10.1007/0-387-24098-5_6
Opacity generalised to transition systems, International Journal of Information Security, vol.79, issue.3???4, pp.421-435, 2008. ,
DOI : 10.1007/s10207-008-0058-x
Quantifying opacity, Mathematical Structures in Computer Science, vol.12, issue.02, pp.361-403, 2015. ,
DOI : 10.1016/j.ic.2007.07.003
Probabilistic opacity for Markov decision processes, Information Processing Letters, vol.115, issue.1, pp.52-59, 2015. ,
DOI : 10.1016/j.ipl.2014.09.001
Comparative branching-time semantics for Markov chains, Information and Computation, vol.200, issue.2, pp.149-214, 2005. ,
DOI : 10.1016/j.ic.2005.03.001
Specification and refinement of probabilistic processes, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.266-277, 1991. ,
DOI : 10.1109/LICS.1991.151651
Modeling and Verification of Randomized Distributed Real-Time Systems, 1995. ,
Model-checking omega-regular properties of interval markov chains, Foundations of Software Science and Computation Structure (FoSSaCS) 2008, pp.302-317, 2008. ,
LTL Model Checking of Interval Markov Chains, LNCS, vol.7795, pp.32-46, 2013. ,
DOI : 10.1007/978-3-642-36742-7_3
Probability and Measure, 1995. ,
Automatic verification of probabilistic concurrent finite state programs, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), pp.327-338, 1985. ,
DOI : 10.1109/SFCS.1985.12
The complexity of probabilistic verification, Journal of the ACM, vol.42, issue.4, pp.857-907, 1995. ,
DOI : 10.1145/210332.210339
Quantifying opacity, Proceedings of the 7th International Conference on Quantitative Evaluation of Systems (QEST'10), pp.263-272, 2010. ,
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Probabilistic Anonymity, Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
From nondeterministic Büchi and Streett automata to deterministic parity automata, Logical Methods in Computer Science, vol.3, issue.3, 2007. ,