메뉴 건너뛰기




Volumn 6958 LNCS, Issue , 2011, Pages 148-162

Differentially private billing with rebates

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS MODELS; CRYPTOGRAPHIC PROTOCOLS; DIFFERENTIAL PRIVACIES; FINE GRAINED; MOBILE MESSAGING; SMART METERING; VOICE CALLS; COMPUTING CLOUDS; PAY PER VIEW;

EID: 80053014815     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24178-9_11     Document Type: Conference Paper
Times cited : (53)

References (14)
  • 7
    • 33746335051 scopus 로고    scopus 로고
    • Differential Privacy
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
    • Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 8
    • 77951688595 scopus 로고    scopus 로고
    • Differential privacy in new settings
    • Charikar, M. (ed.) SIAM, Philadelphia
    • Dwork, C.: Differential privacy in new settings. In: Charikar, M. (ed.) SODA, pp. 174-183. SIAM, Philadelphia (2010)
    • (2010) SODA , pp. 174-183
    • Dwork, C.1
  • 10
    • 80052985192 scopus 로고    scopus 로고
    • Differentially private billing with rebates
    • ePrint Archive, Report 2011/134
    • Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. Cryptology ePrint Archive, Report 2011/134 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Danezis, G.1    Kohlweiss, M.2    Rial, A.3
  • 12
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 13
    • 33947621658 scopus 로고    scopus 로고
    • Simulation-based security with inexhaustible interactive turingmachines
    • IEEE, Los Alamitos
    • Kusters, R.: Simulation-based security with inexhaustible interactive turingmachines. In: 19th IEEE Computer Security Foundations Workshop, pp. 12-320. IEEE, Los Alamitos (2006)
    • (2006) 19th IEEE Computer Security Foundations Workshop , pp. 12-320
    • Kusters, R.1
  • 14
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Cimato, S., Galdi, C., Persiano, G. (eds.) SCN2002. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.