-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
2
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
3
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
24144487020
-
Towards privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee, "Towards privacy in public databases," in Proc. 2nd IACR Theory Crypto. Conf., Cambridge, MA, Feb. 2005, pp. 363-385.
-
Proc. 2nd IACR Theory Crypto. Conf., Cambridge, MA, Feb. 2005
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
5
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Wortmann, "Security-control methods for statistical databases: A comparative study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
6
-
-
0000072558
-
Finding a needle in a haystack - Or identifying anonymous census records
-
T. Dalenius, "Finding a needle in a haystack - or identifying anonymous census records," J. Official Stats., vol. 2, no. 3, pp. 329-336, 1986.
-
(1986)
J. Official Stats.
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
7
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," IEEE Trans. Inform. Theory, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
IEEE Trans. Inform. Theory
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
8
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. 20th Symp. Principles of Database Systems, Santa Barbara, CA, May 2001.
-
Proc. 20th Symp. Principles of Database Systems, Santa Barbara, CA, May 2001
-
-
Agrawal, D.1
Aggarwal, C.2
-
9
-
-
50249086141
-
Differential privacy
-
C. Dwork, "Differential privacy," in Proc. 33rd Intl. Colloq. Automata, Lang., Prog., Venice, Italy, July 2006.
-
Proc. 33rd Intl. Colloq. Automata, Lang., Prog., Venice, Italy, July 2006
-
-
Dwork, C.1
-
10
-
-
0020843592
-
A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers
-
Nov.
-
H. Yamamoto, "A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers," IEEE Trans. Inform. Theory, vol. 29, no. 6, pp. 918-923, Nov. 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.6
, pp. 918-923
-
-
Yamamoto, H.1
-
11
-
-
78650804208
-
A firm foundation for private data analysis
-
Jan. to appear in
-
C. Dwork, "A firm foundation for private data analysis," Jan. 2011, http://research.microsoft.com/apps/pubs/?id=116123, to appear in Communications of the ACM.
-
(2011)
Communications of the ACM
-
-
Dwork, C.1
-
12
-
-
0001777423
-
Anonymous web transactions with crowds
-
M. K. Reiter and A. D. Rubin, "Anonymous web transactions with crowds," Communications of the ACM, vol. 42, no. 2, pp. 32-48, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
13
-
-
71549158964
-
Differential privacy for statistics: What we know and what we want to learn
-
C. Dwork and A. Smith, "Differential privacy for statistics: what we know and what we want to learn," in Proc. NCHS/CDC Data Confidentiality Workshop, Hyattsville, MD, May 2008.
-
Proc. NCHS/CDC Data Confidentiality Workshop, Hyattsville, MD, May 2008
-
-
Dwork, C.1
Smith, A.2
-
15
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. 3rd IACR Theory Crypto. Conf., New York, NY, Mar. 2006.
-
Proc. 3rd IACR Theory Crypto. Conf., New York, NY, Mar. 2006
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
16
-
-
80053281091
-
On privacy-preserving histograms
-
S. Chawla, C. Dwork, F. McSherry, and K. Talwar, "On privacy-preserving histograms," in Proc. 21st Conf. Uncert. Art. Intell., Edinburgh, Scotland, July 2005.
-
Proc. 21st Conf. Uncert. Art. Intell., Edinburgh, Scotland, July 2005
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Talwar, K.4
-
17
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigraphy, D. Thomas, and A. Zhu, "Achieving anonymity via clustering," in Proc. Symp. Principles Database Sys., Dallas, TX, June 2006.
-
Proc. Symp. Principles Database Sys., Dallas, TX, June 2006
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigraphy, R.5
Thomas, D.6
Zhu, A.7
-
18
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowledge Discov. Data, vol. 1, no. 1, 2007.
-
(2007)
ACM Trans. Knowledge Discov. Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
20
-
-
21144442219
-
A survey on private information retrieval
-
W. Gasarch, "A survey on private information retrieval," Bulletin of the EATCS, vol. 82, pp. 72-107, 2004.
-
(2004)
Bulletin of the EATCS
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
21
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai, "Universally composable two-party and multi-party secure computation," in Proc. 34th Annual ACM Symp. Theory of Computing, Montreal, Quebec, Canada, may 2002, pp. 494-503.
-
Proc. 34th Annual ACM Symp. Theory of Computing, Montreal, Quebec, Canada, May 2002
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
24
-
-
77955707622
-
-
in preparation
-
L. Sankar, S. R. Rajagopalan, V. Aggarwal, and H. V. Poor, "Utility and privacy in databases: An information-theoretic approach," 2010, in preparation.
-
(2010)
Utility and Privacy in Databases: An Information-theoretic Approach
-
-
Sankar, L.1
Rajagopalan, S.R.2
Aggarwal, V.3
Poor, H.V.4
-
25
-
-
0003214704
-
Coding theorems for a discrete source with a fidelity criterion
-
C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion," IRE Nat. Conv. Record, vol. 7, pp. 325-350, 1959.
-
(1959)
IRE Nat. Conv. Record
, vol.7
, pp. 325-350
-
-
Shannon, C.E.1
-
26
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
Jan.
-
A. D. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inform. Theory, vol. 22, no. 1, pp. 1-10, Jan. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, Issue.1
, pp. 1-10
-
-
Wyner, A.D.1
Ziv, J.2
-
27
-
-
33747478037
-
Epsilon-entropy of a discrete random variable
-
V. Erokhin, "Epsilon-entropy of a discrete random variable," Theory of Probability and Applications, vol. 3, pp. 97-100, 1958.
-
(1958)
Theory of Probability and Applications
, vol.3
, pp. 97-100
-
-
Erokhin, V.1
-
28
-
-
33747457509
-
An application of rate-distortion theory to a converse to the coding theorem
-
Jan.
-
J. T. Pinkston, "An application of rate-distortion theory to a converse to the coding theorem," IEEE Trans. Inform. Theory, vol. 15, no. 1, pp. 66-71, Jan. 1969.
-
(1969)
IEEE Trans. Inform. Theory
, vol.15
, Issue.1
, pp. 66-71
-
-
Pinkston, J.T.1
|