@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "chatzikokolakis"' papers.bib}}
@UNPUBLISHED{elsalamouny:hal-00760735, AUTHOR = {Elsalamouny, Ehab and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, NOTE = {This paper is to appear in the proceedings of POST 2013 (Principles of Security and Trust).}, TITLE = {{A differentially private mechanism of optimal utility for a region of priors}}, YEAR = 2013, URL = {http://hal.inria.fr/hal-00760735}, X-ID-HAL = {hal-00760735} }
@ARTICLE{chatzikokolakis:hal-00760596, AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Braun, Christelle}, JOURNAL = {{Mathematical Structures in Computer Science}}, NOTE = {To appear}, PUBLISHER = {Cambridge University Press}, TITLE = {{Compositional Methods for Information-Hiding}}, URL = {http://hal.inria.fr/hal-00760596}, X-EDITORIAL-BOARD = {yes}, X-ID-HAL = {hal-00760596}, X-INTERNATIONAL-AUDIENCE = {yes}, YEAR = {2013} }
@INPROCEEDINGS{bruso:hal-00760150, ADDRESS = {Newcastle upon Tyne, United Kingdom}, AUTHOR = {Brus{\'o}, Mayla and Chatzikokolakis, Konstantinos and Etalle, Sandro and Den Hartog, Jerry}, BOOKTITLE = {{7th International Symposium on Trustworthy Global Computing (TGC)}}, NOTE = {To appear}, TITLE = {{Linking Unlinkability}}, URL = {http://hal.inria.fr/hal-00760150}, X-ID-HAL = {hal-00760150}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2012} }
@TECHREPORT{andres:hal-00766821, AUTHOR = {Andres, E., Miguel and Bordenabe, Nicolas E. and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, TITLE = {{Geo-Indistinguishability: Differential Privacy for Location-Based Systems}}, TYPE = {Technical Report}, URL = {http://hal.inria.fr/hal-00766821}, X-ID-HAL = {hal-00766821}, YEAR = {2012} }
@TECHREPORT{chatzikokolakis:hal-00767210, AUTHOR = {Chatzikokolakis, Konstantinos and Andres, E., Miguel and Bordenabe, Nicolas E. and Palamidessi, Catuscia}, TITLE = {{Enhancing Differential Privacy: from Hamming to General Metrics}}, TYPE = {Technical Report}, URL = {http://hal.inria.fr/hal-00767210}, X-ID-HAL = {hal-00767210}, YEAR = {2012} }
@ARTICLE{chatzikokolakis:inria-00637160, AUTHOR = {Chatzikokolakis, Konstantinos and Knight, Sophia and Palamidessi, Catuscia and Panangaden, Prakash}, DOI = {10.1145/2362355.2362356}, JOURNAL = {{Transactions on Computational Logic}}, MONTH = OCT, NUMBER = {4}, PAGES = {28:1-28:35}, PUBLISHER = {ACM}, TITLE = {{Epistemic Strategies and Games on Concurrent Processes}}, URL = {http://hal.inria.fr/inria-00637160}, VOLUME = {13}, X-EDITORIAL-BOARD = {yes}, X-ID-HAL = {inria-00637160}, X-INTERNATIONAL-AUDIENCE = {yes}, YEAR = {2012} }
@INPROCEEDINGS{alvim:hal-00734044, ADDRESS = {Cambridge MA, United States}, AUTHOR = {Alvim, S., Mario and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Smith, Geoffrey}, BOOKTITLE = { Proceedings of {Computer Security Foundations (CSF)}}, DOI = {10.1109/CSF.2012.26}, PAGES = {265-279}, PUBLISHER = {IEEE}, TITLE = {{Measuring Information Leakage using Generalized Gain Functions}}, URL = {http://hal.inria.fr/hal-00734044}, X-ID-HAL = {hal-00734044}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2012} }
@INPROCEEDINGS{alvim:2011:inria-00580122:5, AUTHOR = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia}, X-PAYS = {IT}, TITLE = {{Differential Privacy: on the trade-off between Utility and Information Leakage}}, BOOKTITLE = {{The 8th International Workshop on Formal Aspects of Security \& Trust (FAST)}}, YEAR = {2011}, MONTH = MAR, SERIES = {Lecture Notes in Computer Science}, EDITOR = {Gilles Barthe and Anupam Datta and Sandro Etalle}, PUBLISHER = {Springer}, ADDRESS = {Leuven, Belgium}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, URL = {http://hal.inria.fr/inria-00580122/en}, X-ID-HAL = {inria-00580122} }
@INPROCEEDINGS{alvim:2011:inria-00627937:1, AUTHOR = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, TITLE = {{On the relation between Differential Privacy and Quantitative Information Flow}}, BOOKTITLE = {{38th International Colloquium on Automata, Languages and Programming - ICALP 2011}}, YEAR = {2011}, SERIES = {Lecture Notes in Computer Science}, EDITOR = {Luca Aceto, Monika Henzinger, Jiri Sgall}, DOI = {10.1007/978-3-642-22012-8\_4}, PUBLISHER = {Springer}, VOLUME = {6756}, PAGES = {60-76}, ADDRESS = {Zurich, Switzerland}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, X-INVITED-CONFERENCE = {yes}, URL = {http://hal.inria.fr/inria-00627937/en}, X-ID-HAL = {inria-00627937} }
@INCOLLECTION{alvim:2011:hal-00655522:1, AUTHOR = {Alvim, M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, TITLE = {{Quantitative Information Flow and Applications to Differential Privacy}}, YEAR = {2011}, BOOKTITLE = {{Foundations of Security Analysis and Design VI -- FOSAD Tutorial Lectures}}, EDITOR = {Alessandro Aldini and Roberto Gorrieri}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, DOI = {10.1007/978-3-642-23082-0\_8}, PAGES = {211--230}, VOLUME = {6858}, X-INTERNATIONAL-AUDIENCE = {yes}, URL = {http://hal.inria.fr/hal-00655522/en}, X-ID-HAL = {hal-00655522} }
@PROCEEDINGS{chatzikokolakis:2011:hal-00641020:1, X-PROCEEDINGS = {yes}, AUTHOR = {Chatzikokolakis, Konstantinos and Cortier, V{\'e}ronique}, TITLE = {{Proceedings of the 8th International Workshop on Security Issues in Concurrency}}, YEAR = {2011}, EDITOR = {Konstantinos Chatzikokolakis and V{\'e}ronique Cortier}, PUBLISHER = {Electronic Proceedings in Theoretical Computer Science}, SERIES = {Electronic Proceedings in Theoretical Computer Science}, DOI = {10.4204/EPTCS.51}, PAGES = {51 pages}, VOLUME = {51}, X-INTERNATIONAL-AUDIENCE = {yes}, URL = {http://hal.inria.fr/hal-00641020/en}, X-ID-HAL = {hal-00641020} }
@ARTICLE{chatzikokolakis:2010:inria-00424860:2, AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1016/j.ic.2009.06.006}, JOURNAL = {Information and Computation}, NUMBER = {6}, PAGES = {694-715}, TITLE = {Making Random Choices Invisible to the Scheduler}, URL = {http://hal.inria.fr/inria-00424860/en}, VOLUME = {208}, X-EDITORIAL-BOARD = {yes}, X-ID-HAL = {inria-00424860}, X-INTERNATIONAL-AUDIENCE = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.ic.2009.06.006} }
@TECHREPORT{alvim:2010:hal-00548214:1, AUTHOR = {Alvim, M{\'a}rio S. and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, INSTITUTION = {INRIA}, TITLE = {Differential Privacy versus Quantitative Information Flow}, URL = {http://hal.inria.fr/hal-00548214/en}, X-ID-HAL = {hal-00548214}, X-PAYS = {NL,IT}, YEAR = {2010} }
@INPROCEEDINGS{Braun:09:MFPS, AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, BOOKTITLE = {Proceedings of the 25th Conf. on Mathematical Foundations of Programming Semantics}, DATE-ADDED = {2010-12-30 03:55:02 +0100}, DATE-MODIFIED = {2010-12-30 03:55:02 +0100}, PAGES = {75-91}, PUBLISHER = {Elsevier B.V.}, SERIES = {Electronic Notes in Theoretical Computer Science}, TITLE = {Quantitative Notions of Leakage for One-try Attacks}, URL = {http://hal.archives-ouvertes.fr/inria-00424852/en/}, VOLUME = {249}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {NL}, X-PROCEEDINGS = {yes}, YEAR = {2009}, BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00424852/en/} }
@INPROCEEDINGS{Braun:08:FOSSACS, AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, BOOKTITLE = {Proceedings of FOSSACS}, DATE-ADDED = {2008-12-30 06:11:27 +0100}, DATE-MODIFIED = {2008-12-30 06:11:27 +0100}, DOI = {10.1007/978-3-540-78499-9_31}, EDITOR = {Roberto Amadio}, PAGES = {443-457}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Compositional Methods for Information-Hiding}, URL = {http://hal.inria.fr/inria-00349227/en/}, VOLUME = {4962}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349227/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-78499-9_31}, BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf} }
@INPROCEEDINGS{Beauxis:08:TGC, AUTHOR = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, BOOKTITLE = {Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007)}, DATE-ADDED = {2008-12-30 06:10:45 +0100}, DATE-MODIFIED = {2008-12-30 06:10:45 +0100}, DOI = {10.1007/978-3-540-78663-4_23}, EDITOR = {Gilles Barthe and C{\'e}dric Fournet}, PAGES = {347-362}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels-TGC07/tgc.pdf}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Formal Approaches to Information-Hiding (Tutorial)}, URL = {http://hal.inria.fr/inria-00261827/en/}, VOLUME = {4912}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23}, BDSK-URL-2 = {http://hal.inria.fr/inria-00261827/en/} }
@ARTICLE{Chatzikokolakis:08:JCS, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, DATE-ADDED = {2008-12-30 06:07:59 +0100}, DATE-MODIFIED = {2008-12-30 06:07:59 +0100}, DOI = {10.3233/JCS-2008-0333}, JOURNAL = {Journal of Computer Security}, NUMBER = {5}, PAGES = {531--571}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}, TITLE = {On the Bayes risk in information-hiding protocols}, URL = {http://hal.inria.fr/inria-00349224/en/}, VOLUME = {16}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349224/en/}, BDSK-URL-2 = {http://dx.doi.org/10.3233/JCS-2008-0333}, BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf} }
@INPROCEEDINGS{Chatzikokolakis:08:MFPS, AUTHOR = {Konstantinos Chatzikokolakis and Keye Martin}, BOOKTITLE = {Proceedings of the Twenty-fourth Conference on the Mathematical Foundations of Programming Semantics}, DATE-ADDED = {2008-07-22 05:54:40 +0200}, DATE-MODIFIED = {2008-12-24 16:25:39 +0100}, DOI = {10.1016/j.entcs.2008.10.008}, EDITOR = {Andrej Bauer and Michael Mislove}, PAGES = {111-129}, PUBLISHER = {Elsevier B.V.}, SERIES = {Electronic Notes in Theoretical Computer Science}, TITLE = {A Monotonicity Principle for Information Theory.}, VOLUME = {218}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.008} }
@PHDTHESIS{Chatzikokolakis:07:PhDThesis, AUTHOR = {Konstantinos Chatzikokolakis}, LIXCATEGORIE = {TH}, LIXEQUIPE = {comete}, MONTH = OCT, NOTE = {\url{www.lix.polytechnique.fr/~kostas/thesis.pdf}}, SCHOOL = {LIX, \'Ecole Polytechnique}, TITLE = {Probabilistic and Information-Theoretic Approaches to Anonymity}, YEAR = {2007} }
@ARTICLE{Chatzikokolakis:08:IC, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, DATE-MODIFIED = {2010-01-04 10:41:19 +0100}, DOI = {10.1016/j.ic.2007.07.003}, JOURNAL = {Inf. and Comp.}, NUMBER = {2--4}, PAGES = {378--401}, TITLE = {Anonymity Protocols as Noisy Channels}, URL = {http://hal.inria.fr/inria-00349225/en/}, VOLUME = {206}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349225/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1016/j.ic.2007.07.003} }
@INPROCEEDINGS{Chatzikokolakis:07:CONCUR, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, BOOKTITLE = {Proceedings of CONCUR'07}, EDITOR = {Lu{\'\i}s Caires and Vasco Thudichum Vasconcelos}, NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Scheduler/report.pdf}}, PAGES = {42--58}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Making Random Choices Invisible to the Scheduler}, VOLUME = {4703}, YEAR = 2007 }
@INPROCEEDINGS{Chatzikokolakis:07:CSF, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, BOOKTITLE = {Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)}, DATE-MODIFIED = {2008-12-30 05:07:47 +0100}, PAGES = {341-354}, PUBLISHER = {IEEE Computer Society}, TITLE = {Probability of Error in Information-Hiding Protocols}, YEAR = 2007, BDSK-URL-1 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full_original.pdf} }
@INPROCEEDINGS{Chatzikokolakis:06:TGC, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, BOOKTITLE = {Proceedings of the 2nd Symposium on Trustworthy Global Computing (TGC)}, DATE-MODIFIED = {2007-12-23 19:18:49 +0100}, NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels/tgc.pdf}}, PAGES = {281-300}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Anonymity Protocols as Noisy Channels}, VOLUME = {4661}, YEAR = {2006} }
@ARTICLE{Chatzikokolakis:06:TCS, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, DATE-MODIFIED = {2008-12-28 16:57:29 +0100}, JOURNAL = {Theoretical Computer Science}, NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/tcsPI.pdf}}, NUMBER = {1-2}, PAGES = {123--138}, TITLE = {Probable Innocence Revisited}, URL = {http://hal.inria.fr/inria-00201072/en/}, VOLUME = 367, YEAR = {2006}, BDSK-URL-1 = {http://hal.inria.fr/inria-00201072/en/} }
@ARTICLE{Chatzikokolakis:05:TCS, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, DATE-MODIFIED = {2007-12-16 16:11:42 +0100}, JOURNAL = {Theoretical Computer Science}, NOTE = {A short version of this paper appeared in the {\em Proceedings of the Symposium on Trustworthy Global Computing (TGC)}, volume 3705 of LNCS, pages 146-162. Springer. \url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/TCSreport.pdf}}, NUMBER = {3}, PAGES = {512-527}, TITLE = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange}, VOLUME = {389}, YEAR = 2007 }
@INPROCEEDINGS{Chatzikokolakis:05:TGC, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, BOOKTITLE = {Proceedings of the Symp. on Trustworthy Global Computing}, NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/tgc05.pdf}}, PAGES = {146-162}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange}, VOLUME = 3705, YEAR = {2005} }
@INPROCEEDINGS{Chatzikokolakis:05:FAST, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, BOOKTITLE = {Third International Workshop on Formal Aspects in Security and Trust (FAST 2005), Revised Selected Papers}, EDITOR = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, PAGES = {142-157}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Probable Innocence Revisited}, VOLUME = {3866}, YEAR = {2006} }
@INPROCEEDINGS{Chothia:05:NCUS, AUTHOR = {Tom Chothia and Konstantinos Chatzikokolakis}, BOOKTITLE = {Proceedings of the IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005)}, PAGES = {744--755}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {A Survey of Anonymous Peer-to-Peer File-Sharing}, VOLUME = {3823}, YEAR = {2005} }
@TECHREPORT{Chatzikokolakis:05:TR, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, INSTITUTION = {INRIA Futurs and LIX}, NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf}}, TITLE = {Probable Innocence Revisited}, YEAR = {2005} }
This file has been generated by bibtex2html 1.74