\begin{thebibliography}{10} \bibitem{Cachin:97:PhD} Christian Cachin. \newblock {\em Entropy Measures and Unconditional Security in Cryptography}. \newblock PhD thesis, 1997. \bibitem{Chatzikokolakis:08:IC} Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. \newblock Anonymity protocols as noisy channels. \newblock {\em Inf. and Comp.}, 206(2--4):378--401, 2008. \bibitem{Chatzikokolakis:08:JCS} Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. \newblock On the {Bayes} risk in information-hiding protocols. \newblock {\em Journal of Computer Security}, 16(5):531--571, 2008. \bibitem{Clark:05:JLC} David Clark, Sebastian Hunt, and Pasquale Malacaria. \newblock Quantitative information flow, relations and polymorphic types. \newblock {\em J. of Logic and Comp.}, 18(2):181--199, 2005. \bibitem{Clarkson:09:JCS} Michael~R. Clarkson, Andrew~C. Myers, and Fred~B. Schneider. \newblock Belief in information flow. \newblock {\em Journal of Computer Security}, 17(5):655--701, 2009. \bibitem{Csiszar:95:TIT} Imre Csisz{\'a}r. \newblock {Generalized cutoff rates and R{\'e}nyi's information measures}. \newblock {\em Transactions on Information Theory}, 41(1):26--34, 1995. \bibitem{Hamadou:10:SSP} Sardaouna Hamadou, Vladimiro Sassone, and Catuscia Palamidessi. \newblock Reconciling belief and vulnerability in information flow. \newblock In {\em Proc. of the IEEE Symposium on Security and Privacy}. IEEE, 2010. \newblock To appear. \bibitem{Kopf:07:CCS} Boris K{\"o}pf and David~A. Basin. \newblock An information-theoretic model for adaptive side-channel attacks. \newblock In {\em Proc. of CCS}, pages 286--296. ACM, 2007. \bibitem{Malacaria:07:POPL} Pasquale Malacaria. \newblock Assessing security threats of looping constructs. \newblock In {\em Proc. of POPL}, pages 225--235. ACM, 2007. \bibitem{Malacaria:08:PLAS} Pasquale Malacaria and Han Chen. \newblock Lagrange multipliers and maximum information leakage in different observational models. \newblock In {\em Proc. of PLAS}, pages 135--146. ACM, 2008. \bibitem{Massey:94:IT} Massey. \newblock Guessing and entropy. \newblock In {\em Proceedings of the IEEE International Symposium on Information Theory}, page 204. IEEE, 1994. \bibitem{Moskowitz:03:WPES} Ira~S. Moskowitz, Richard~E. Newman, Daniel~P. Crepeau, and Allen~R. Miller. \newblock Covert channels and anonymizing networks. \newblock In {\em Proc. of PES}, pages 79--88. ACM, 2003. \bibitem{Moskowitz:03:CNIS} Ira~S. Moskowitz, Richard~E. Newman, and Paul~F. Syverson. \newblock Quasi-anonymous channels. \newblock In {\em Proc. of CNIS}, pages 126--131. IASTED, 2003. \bibitem{Pliam:00:INDOCRYPT} Pliam. \newblock On the incomparability of entropy and marginal guesswork in brute-force attacks. \newblock In {\em Proc. of INDOCRYPT}, number 1977 in LNCS, pages 67--79. Springer-Verlag, 2000. \bibitem{Renyi:61:Berkeley} Alfr\'ed R\'enyi. \newblock {On Measures of Entropy and Information}. \newblock In {\em Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability}, pages 547--561, 1961. \bibitem{Smith:09:FOSSACS} Geoffrey Smith. \newblock On the foundations of quantitative information flow. \newblock In {\em Proc. of FOSSACS}, volume 5504 of {\em LNCS}, pages 288--302. Springer, 2009. \bibitem{Zhu:05:ICDCS} Ye~Zhu and Riccardo Bettati. \newblock Anonymity vs. information leakage in anonymity systems. \newblock In {\em Proc. of ICDCS}, pages 514--524. IEEE, 2005. \end{thebibliography}