-
1
-
-
0024914229
-
Security-control methods for statistical data-bases: A comparative study
-
N. R. Adam and J. C. Wortmann, Security-Control Methods for Statistical Data-bases: A Comparative Study, ACM Computing Surveys 21(4): 515-556 (1989).
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
June
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: The SuLQ framework. In Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 128-138, June 2005.
-
(2005)
Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
4
-
-
24144487020
-
Toward privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Proceedings of the 2nd Theory of Cryptography Conference, pages 363-385, 2005.
-
(2005)
Proceedings of the 2nd Theory of Cryptography Conference
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
6
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius, Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, pp. 429-222, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-1222
-
-
Dalenius, T.1
-
9
-
-
0018444418
-
Secure databases: Protection against user influence
-
D. Dobkin, A.K. Jones, and R.J. Lipton, Secure databases: Protection against user influence. ACM Trans. Database Syst. 4(1), pp. 97-106, 1979.
-
(1979)
ACM Trans. Database Syst.
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
10
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of EUROCRYPT 2004, pp. 523-540, 2004.
-
(2004)
Proceedings of EUROCRYPT 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
12
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference, pages 265-284, 2006.
-
(2006)
Proceedings of the 3rd Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
17
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, 1996.
-
(1996)
J. Comput. Syst. Sci.
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
18
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Ronen Shaltiel. Recent developments in explicit constructions of extractors. Bulletin of the EATCS, 77:67-95, 2002.
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
19
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
Sweeney, L., Weaving technology and policy together to maintain confidentiality. J Law Med Ethics, 1997. 25(2-3): p. 98-110.
-
(1997)
J Law Med Ethics
, vol.25
, Issue.2-3
, pp. 98-110
-
-
Sweeney, L.1
|