-
2
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts." Communications of the ACM, vol. 28, no. 6, pp. 637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
5
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, ser. S. Halevi and T. Rabin, Eds., Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, ser. Lecture Notes in Computer Science, S. Halevi and T. Rabin, Eds., vol. 3876. Springer, 2006, pp. 265-284.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
6
-
-
33746335051
-
Differential privacy
-
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Part II, ser. M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., Springer
-
C. Dwork, "Differential privacy," in Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Part II, ser. Lecture Notes in Computer Science, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., vol. 4052. Springer, 2006, pp. 1-12.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
7
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
M. Mitzenmacher, Ed. ACM
-
A. Ghosh, T. Roughgarden, and M. Sundararajan, "Universally utility-maximizing privacy mechanisms," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, M. Mitzenmacher, Ed. ACM, 2009, pp. 351-360.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
8
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Advances in Cryptology - CRYPTO 2004, ser. M. K. Franklin, Ed., Springer
-
C. Dwork and K. Nissim, "Privacy-preserving datamining on vertically partitioned databases," in Advances in Cryptology - CRYPTO 2004, ser. Lecture Notes in Computer Science, M. K. Franklin, Ed., vol. 3152. Springer, 2004, pp. 528-544.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
9
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Advances in Cryptology - CRYPTO 2008, ser. D. Wagner, Ed., Springer
-
A. Beimel, K. Nissim, and E. Omri, "Distributed private data analysis: Simultaneously solving how and what," in Advances in Cryptology - CRYPTO 2008, ser. Lecture Notes in Computer Science, D. Wagner, Ed., vol. 5157. Springer, 2008, pp. 451-468.
-
(2008)
Lecture Notes in Computer Science
, vol.5157
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
10
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Advances in Cryptology - EUROCRYPT 2006, ser. Springer
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our data, ourselves: privacy via distributed noise generation," in Advances in Cryptology - EUROCRYPT 2006, ser. Lecture Notes in Computer Science, vol. 4004. Springer, 2006, pp. 486-503.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
11
-
-
70350338483
-
Computational differential privacy
-
CRYPTO, ser. S. Halevi, Ed., Springer
-
I. Mironov, O. Pandey, O. Reingold, and S. P. Vadhan, "Computational differential privacy," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 126-142.
-
(2009)
Lecture Notes in Computer Science
, vol.5677
, pp. 126-142
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.P.4
-
12
-
-
51249175241
-
Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
-
Online. Available
-
U. V. Vazirani, "Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources," Combinatorica, vol. 7, no. 4, pp. 375-392, 1987. [Online]. Available: http://dx.doi.org/10.1007/BF02579325
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.V.1
-
13
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
Mar.
-
S. L. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," Journal of the American Statistical Association, vol. 60, no. 309, pp. 63-69, Mar. 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
14
-
-
0036953748
-
An information statistics approach to data stream and communication complexity
-
IEEE Computer Society
-
Z. Bar-Yossef, T. S. Jayram, R. Kumar, and D. Sivakumar, "An information statistics approach to data stream and communication complexity," in 43rd Symposium on Foundations of Computer Science, FOCS 2002. IEEE Computer Society, 2002, pp. 209-218.
-
(2002)
43rd Symposium on Foundations of Computer Science, FOCS 2002
, pp. 209-218
-
-
Bar-Yossef, Z.1
Jayram, T.S.2
Kumar, R.3
Sivakumar, D.4
-
16
-
-
77954724787
-
How to compress interactive communication
-
L. J. Schulman, Ed. ACM
-
B. Barak, M. Braverman, X. Chen, and A. Rao, "How to compress interactive communication," in Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, L. J. Schulman, Ed. ACM, 2010, pp. 67-76.
-
(2010)
Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010
, pp. 67-76
-
-
Barak, B.1
Braverman, M.2
Chen, X.3
Rao, A.4
-
18
-
-
85043988965
-
Finding similar files in a large file system
-
U. Manber, "Finding similar files in a large file system," in USENIX Winter, 1994, pp. 1-10.
-
(1994)
USENIX Winter
, pp. 1-10
-
-
Manber, U.1
-
19
-
-
77955316963
-
Parallel repetition: Simplification and the no-signaling case
-
Online. Available
-
T. Holenstein, "Parallel repetition: Simplification and the no-signaling case," Theory of Computing, vol. 5, no. 1, pp. 141-172, 2009. [Online]. Available: http://www.theoryofcomputing.org/articles/v005a008
-
(2009)
Theory of Computing
, vol.5
, Issue.1
, pp. 141-172
-
-
Holenstein, T.1
-
20
-
-
77954754217
-
Approximate privacy: Foundations and quantification
-
extended abstract
-
J. Feigenbaum, A. D. Jaggard, and M. Schapira, "Approximate privacy: foundations and quantification (extended abstract)," in ACM Conference on Electronic Commerce, 2010, pp. 167-178.
-
ACM Conference on Electronic Commerce, 2010
, pp. 167-178
-
-
Feigenbaum, J.1
Jaggard, A.D.2
Schapira, M.3
-
21
-
-
0002738457
-
A zero-one law for boolean privacy
-
B. Chor and E. Kushilevitz, "A zero-one law for boolean privacy," SIAM J. Discrete Math., vol. 4, no. 1, pp. 36-47, 1991.
-
(1991)
SIAM J. Discrete Math.
, vol.4
, Issue.1
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
22
-
-
0002365530
-
Privacy and communication complexity
-
E. Kushilevitz, "Privacy and communication complexity," SIAM J. Discrete Math., vol. 5, no. 2, pp. 273-284, 1992.
-
(1992)
SIAM J. Discrete Math.
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
23
-
-
85039623622
-
Some complexity questions related to distributive computing (preliminary report)
-
New York, NY, USA: ACM
-
A. C.-C. Yao, "Some complexity questions related to distributive computing (preliminary report)," in STOC '79: Proceedings of the eleventh annual ACM symposium on Theory of computing. New York, NY, USA: ACM, 1979, pp. 209-213.
-
(1979)
STOC '79: Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing
, pp. 209-213
-
-
Yao, A.C.-C.1
-
24
-
-
0021469810
-
Generating quasirandom sequences from semirandom sources
-
Online. Available
-
M. Sántha and U. V. Vazirani, "Generating quasirandom sequences from semirandom sources," Journal of Computer and System Sciences, vol. 33, no. 1, pp. 75-87, 1986. [Online]. Available: http://dx.doi.org/10.1016/0022-0000(86)90044-9
-
(1986)
Journal of Computer and System Sciences
, vol.33
, Issue.1
, pp. 75-87
-
-
Sántha, M.1
Vazirani, U.V.2
-
26
-
-
30744451262
-
On extracting private randomness over a public channel
-
RANDOM-APPROX, ser. S. Arora, K. Jansen, J. D. P. Rolim, and A. Sahai, Eds., Springer
-
Y. Dodis and R. Oliveira, "On extracting private randomness over a public channel," in RANDOM-APPROX, ser. Lecture Notes in Computer Science, S. Arora, K. Jansen, J. D. P. Rolim, and A. Sahai, Eds., vol. 2764. Springer, 2003, pp. 252-263.
-
(2003)
Lecture Notes in Computer Science
, vol.2764
, pp. 252-263
-
-
Dodis, Y.1
Oliveira, R.2
-
28
-
-
0035175812
-
Informational complexity and the direct sum problem for simultaneous message complexity
-
A. Chakrabarti, Y. Shi, A. Wirth, and A. C. Yao, "Informational complexity and the direct sum problem for simultaneous message complexity," in Proc. 42nd Annual IEEE Symposium on Foundations of Computer Science, 2001, pp. 270-278.
-
Proc. 42nd Annual IEEE Symposium on Foundations of Computer Science, 2001
, pp. 270-278
-
-
Chakrabarti, A.1
Shi, Y.2
Wirth, A.3
Yao, A.C.4
-
30
-
-
79960173817
-
Panprivate streaming algorithms
-
Tsinghua University Press, Beijing
-
C. Dwork, M. Naor, T. Pitassi, G. Rothblum, and S. Yekhanin, "Panprivate streaming algorithms," in Proceedings of the First Symposium on Innovations in Computer Science (ICS 2010). Tsinghua University Press, Beijing, 2010.
-
(2010)
Proceedings of the First Symposium on Innovations in Computer Science (ICS 2010)
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.4
Yekhanin, S.5
|