-
2
-
-
78650887542
-
Private memoirs of a smart meter
-
Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys 2010), Zurich, Switzerland (November 2010)
-
2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys 2010), Zurich, Switzerland (November 2010)
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
3
-
-
85076310471
-
Pretp: Privacy-preserving electronic toll pricing
-
USENIX Association
-
Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I., Geuens, C.: Pretp: Privacy-preserving electronic toll pricing. In: USENIX Security Symposium, pp. 63-78. USENIX Association (2010)
-
(2010)
USENIX Security Symposium
, pp. 63-78
-
-
Balasch, J.1
Rial, A.2
Troncoso, C.3
Preneel, B.4
Verbauwhede, I.5
Geuens, C.6
-
4
-
-
77954893607
-
A privacy model for smart metering
-
May
-
Bohli, J.M., Sorge, C., Ugus, O.: A privacy model for smart metering. In: 2010 IEEE International Conference on Communications Workshops (ICC), pp. 1-5 (May 2010)
-
(2010)
2010 IEEE International Conference on Communications Workshops (ICC)
, pp. 1-5
-
-
Bohli, J.M.1
Sorge, C.2
Ugus, O.3
-
7
-
-
33746335051
-
Differential Privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
77951688595
-
Differential privacy in new settings
-
Charikar, M. (ed.) SIAM, Philadelphia
-
Dwork, C.: Differential privacy in new settings. In: Charikar, M. (ed.) SODA, pp. 174-183. SIAM, Philadelphia (2010)
-
(2010)
SODA
, pp. 174-183
-
-
Dwork, C.1
-
9
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
ACM, New York
-
Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the 41st Annual ACMSymposium on Theory of Computing, STOC 2009, pp. 351-360. ACM, New York (2009)
-
(2009)
Proceedings of the 41st Annual ACMSymposium on Theory of Computing, STOC 2009
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
10
-
-
80052985192
-
Differentially private billing with rebates
-
ePrint Archive, Report 2011/134
-
Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. Cryptology ePrint Archive, Report 2011/134 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Danezis, G.1
Kohlweiss, M.2
Rial, A.3
-
11
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
DOI 10.1145/1265530.1265569, Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2007
-
Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Libkin, L. (ed.) PODS, pp. 273-282. ACM, New York (2007) (Pubitemid 47620902)
-
(2007)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
12
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
13
-
-
33947621658
-
Simulation-based security with inexhaustible interactive turingmachines
-
IEEE, Los Alamitos
-
Kusters, R.: Simulation-based security with inexhaustible interactive turingmachines. In: 19th IEEE Computer Security Foundations Workshop, pp. 12-320. IEEE, Los Alamitos (2006)
-
(2006)
19th IEEE Computer Security Foundations Workshop
, pp. 12-320
-
-
Kusters, R.1
-
14
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
|