메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1220-1227

An information-theoretic approach to privacy

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL MODEL; ELECTRONIC DATA SOURCES; INFORMATION-THEORETIC APPROACH; PERSONALLY IDENTIFIABLE INFORMATION; STATE-OF-THE-ART APPROACH; TIGHT BOUND; UNSOLVED PROBLEMS;

EID: 79952434371     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2010.5707053     Document Type: Conference Paper
Times cited : (20)

References (28)
  • 1
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 2
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Sys. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Wortmann, "Security-control methods for statistical databases: A comparative study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 6
    • 0000072558 scopus 로고
    • Finding a needle in a haystack - Or identifying anonymous census records
    • T. Dalenius, "Finding a needle in a haystack - or identifying anonymous census records," J. Official Stats., vol. 2, no. 3, pp. 329-336, 1986.
    • (1986) J. Official Stats. , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 7
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • L. Sweeney, "k-anonymity: A model for protecting privacy," IEEE Trans. Inform. Theory, vol. 10, no. 5, pp. 557-570, 2002.
    • (2002) IEEE Trans. Inform. Theory , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 10
    • 0020843592 scopus 로고
    • A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers
    • Nov.
    • H. Yamamoto, "A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers," IEEE Trans. Inform. Theory, vol. 29, no. 6, pp. 918-923, Nov. 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.6 , pp. 918-923
    • Yamamoto, H.1
  • 11
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • Jan. to appear in
    • C. Dwork, "A firm foundation for private data analysis," Jan. 2011, http://research.microsoft.com/apps/pubs/?id=116123, to appear in Communications of the ACM.
    • (2011) Communications of the ACM
    • Dwork, C.1
  • 12
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • M. K. Reiter and A. D. Rubin, "Anonymous web transactions with crowds," Communications of the ACM, vol. 42, no. 2, pp. 32-48, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 20
    • 21144442219 scopus 로고    scopus 로고
    • A survey on private information retrieval
    • W. Gasarch, "A survey on private information retrieval," Bulletin of the EATCS, vol. 82, pp. 72-107, 2004.
    • (2004) Bulletin of the EATCS , vol.82 , pp. 72-107
    • Gasarch, W.1
  • 25
    • 0003214704 scopus 로고
    • Coding theorems for a discrete source with a fidelity criterion
    • C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion," IRE Nat. Conv. Record, vol. 7, pp. 325-350, 1959.
    • (1959) IRE Nat. Conv. Record , vol.7 , pp. 325-350
    • Shannon, C.E.1
  • 26
    • 0016882596 scopus 로고
    • The rate-distortion function for source coding with side information at the decoder
    • Jan.
    • A. D. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inform. Theory, vol. 22, no. 1, pp. 1-10, Jan. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.22 , Issue.1 , pp. 1-10
    • Wyner, A.D.1    Ziv, J.2
  • 27
    • 33747478037 scopus 로고
    • Epsilon-entropy of a discrete random variable
    • V. Erokhin, "Epsilon-entropy of a discrete random variable," Theory of Probability and Applications, vol. 3, pp. 97-100, 1958.
    • (1958) Theory of Probability and Applications , vol.3 , pp. 97-100
    • Erokhin, V.1
  • 28
    • 33747457509 scopus 로고
    • An application of rate-distortion theory to a converse to the coding theorem
    • Jan.
    • J. T. Pinkston, "An application of rate-distortion theory to a converse to the coding theorem," IEEE Trans. Inform. Theory, vol. 15, no. 1, pp. 66-71, Jan. 1969.
    • (1969) IEEE Trans. Inform. Theory , vol.15 , Issue.1 , pp. 66-71
    • Pinkston, J.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.