Modeling and Analysis of Information Leakage Under Multiple Adversaries | IEEE Conference Publication | IEEE Xplore