-
1
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
3
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT, pages 573-592, 2006.
-
(2006)
EUROCRYPT
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
4
-
-
84985922619
-
Tracing traitors
-
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In CRYPTO, pages 257-270, 1994.
-
(1994)
CRYPTO
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
5
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
6
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
S. Halevy and T. Rabin, editors, Springer-Verlag
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevy and T. Rabin, editors, First Theory of Cryptography Conference (TCC), volume 3876, pages 265-284. Springer-Verlag, 2006.
-
(2006)
First Theory of Cryptography Conference (TCC)
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
7
-
-
35449000081
-
The price of privacy and the limits of lp decoding
-
C. Dwork, F. McSherry, and K. Talwar. The price of privacy and the limits of lp decoding. In STOC, pages 85-94, 2007.
-
(2007)
STOC
, pp. 85-94
-
-
Dwork, C.1
McSherry, F.2
Talwar, K.3
-
8
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528-544, 2004.
-
(2004)
CRYPTO
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
9
-
-
51849089628
-
New efficient attacks on statistical disclosure control mechanisms
-
C. Dwork and S. Yekhanin. New efficient attacks on statistical disclosure control mechanisms. In CRYPTO, pages 469-480, 2008.
-
(2008)
CRYPTO
, pp. 469-480
-
-
Dwork, C.1
Yekhanin, S.2
-
12
-
-
0022793132
-
How to construct pseudorandom functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct pseudorandom functions. Journal of the ACM, 33(2):792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.2
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
51849156726
-
Uniform direct product theorems: Simplified, optimized, and derandomized
-
R. Impagliazzo, R. Jaiswal, V. Kabanets, and A. Wigderson. Uniform direct product theorems: simplified, optimized, and derandomized. In STOC, pages 579{588, 2008.
-
(2008)
STOC, pages 579{588
-
-
Impagliazzo, R.1
Jaiswal, R.2
Kabanets, V.3
Wigderson, A.4
-
15
-
-
84885907344
-
What can we learn privately?
-
P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In FOCS, pages 1-19, 2008.
-
(2008)
FOCS
, pp. 1-19
-
-
Kasiviswanathan, P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
16
-
-
84880901368
-
Self protecting pirates and black-box traitor tracing
-
A. Kiayias and M. Yung. Self protecting pirates and black-box traitor tracing. In CRYPTO, pages 63-79, 2001.
-
(2001)
CRYPTO
, pp. 63-79
-
-
Kiayias, A.1
Yung, M.2
-
17
-
-
46749128577
-
Mechanism design via differential privacy
-
IEEE Computer Society
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103. IEEE Computer Society, 2007.
-
(2007)
FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
19
-
-
84957085334
-
Theoretical views of boosting and applications
-
R. E. Schapire. Theoretical views of boosting and applications. In ATL, pages 13-25, 1999.
-
(1999)
ATL
, pp. 13-25
-
-
Schapire, R.E.1
-
20
-
-
0021518106
-
A theory of the learnable
-
L. G. Valiant. A theory of the learnable. Commun. ACM, 27(11):1134-1142, 1984.
-
(1984)
Commun. ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
|