-
1
-
-
79960012182
-
-
Technical report
-
Alvim, M.S., Andrés, M.E., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential privacy: on the trade-off between utility and information leakage. Technical report (2011), http://hal.inria.fr/inria- 00580122/en/
-
(2011)
Differential Privacy: On the Trade-off Between Utility and Information Leakage
-
-
Alvim, M.S.1
Andrés, M.E.2
Chatzikokolakis, K.3
Degano, P.4
Palamidessi, C.5
-
2
-
-
79959951821
-
-
Technical report
-
Alvim, M.S., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential privacy versus quantitative information flow. Technical report (2010)
-
(2010)
Differential Privacy Versus Quantitative Information Flow
-
-
Alvim, M.S.1
Chatzikokolakis, K.2
Degano, P.3
Palamidessi, C.4
-
3
-
-
80052677847
-
Information-theoretic bounds for differentially private mechanisms
-
to appear
-
Barthe, G., Köpf, B.: Information-theoretic bounds for differentially private mechanisms. In: Proc. of CSF (to appear, 2011)
-
(2011)
Proc. of CSF
-
-
Barthe, G.1
Köpf, B.2
-
5
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Inf. and Comp. 206(2-4), 378-401 (2008)
-
(2008)
Inf. and Comp.
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
6
-
-
54349091549
-
On the Bayes risk in information-hiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the Bayes risk in information-hiding protocols. J. of Comp. Security 16(5), 531-571 (2008)
-
(2008)
J. of Comp. Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
7
-
-
0023861309
-
Dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65-75 (1988) (Pubitemid 18606152)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum David1
-
8
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
DOI 10.1093/logcom/exi009, Lambda Calculus, Type Theory and Natural Language
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. J. of Logic and Computation 18(2), 181-199 (2005) (Pubitemid 40860589)
-
(2005)
Journal of Logic and Computation
, vol.15
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
10
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 38(1), 97-139 (2008)
-
(2008)
SIAM Journal of Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
11
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
In: Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
12
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006) (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
13
-
-
77951688595
-
Differential privacy in new settings
-
Austin, Texas, USA, January 17-19, SIAM, Philadelphia
-
Dwork, C.: Differential privacy in new settings. In: Proc. of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, pp. 174-183. SIAM, Philadelphia (2010)
-
(2010)
Proc. of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010
, pp. 174-183
-
-
Dwork, C.1
-
14
-
-
78650804208
-
A firm foundation for private data analysis
-
Dwork, C.: A firm foundation for private data analysis. Communications of the ACM 54(1), 86-96 (2011)
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
, pp. 86-96
-
-
Dwork, C.1
-
15
-
-
70350682013
-
Differential privacy and robust statistics
-
Bethesda, MD, USA, May 31-June 2, ACM, New York
-
Dwork, C., Lei, J.: Differential privacy and robust statistics. In: Proc. of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31-June 2, pp. 371-380. ACM, New York (2009)
-
(2009)
Proc. of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
16
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
ACM, New York
-
Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proc. of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 351-360. ACM, New York (2009)
-
(2009)
Proc. of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
17
-
-
77953239541
-
Applied quantitative information flow and statistical databases
-
In: Degano, P., Guttman, J.D. (eds.) Springer, Heidelberg
-
Heusser, J., Malacaria, P.: Applied quantitative information flow and statistical databases. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 96-110. Springer, Heidelberg (2010)
-
(2010)
FAST 2009. LNCS
, vol.5983
, pp. 96-110
-
-
Heusser, J.1
Malacaria, P.2
-
18
-
-
0035263743
-
Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity
-
Joinson, A.N.: Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. Eur. J. Soc. Psychol. 31(2), 177-192 (2001)
-
(2001)
Eur. J. Soc. Psychol.
, vol.31
, Issue.2
, pp. 177-192
-
-
Joinson, A.N.1
-
19
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
ACM, New York
-
Köpf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Proc. of CCS, pp. 286-296. ACM, New York (2007)
-
(2007)
Proc. of CCS
, pp. 286-296
-
-
Köpf, B.1
Basin, D.A.2
-
20
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
ACM, New York
-
Köpf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Proc. of CCS, pp. 286-296. ACM, New York (2007)
-
(2007)
Proc. of CCS
, pp. 286-296
-
-
Köpf, B.1
Basin, D.A.2
-
21
-
-
33846535380
-
Assessing security threats of looping constructs
-
ACM, New York
-
Malacaria, P.: Assessing security threats of looping constructs. In: Proc. of POPL, pp. 225-235. ACM, New York (2007)
-
(2007)
Proc. of POPL
, pp. 225-235
-
-
Malacaria, P.1
-
22
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
ACM, New York
-
Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: Proc. of PLAS, pp. 135-146. ACM, New York (2008)
-
(2008)
Proc. of PLAS
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
23
-
-
84944047666
-
Massey: Guessing and entropy
-
IEEE, Los Alamitos
-
Massey: Guessing and entropy. In: Proc. of ISIT, p. 204. IEEE, Los Alamitos (1994)
-
(1994)
Proc. of ISIT
, pp. 204
-
-
-
24
-
-
1642355346
-
Covert channels and anonymizing networks
-
ACM, New York
-
Moskowitz, I.S., Newman, R.E., Crepeau, D.P., Miller, A.R.: Covert channels and anonymizing networks. In: Proc. of PES, pp. 79-88. ACM, New York (2003)
-
(2003)
Proc. of PES
, pp. 79-88
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
25
-
-
2642560372
-
Quasi-anonymous channels
-
IASTED
-
Moskowitz, I.S., Newman, R.E., Syverson, P.F.: Quasi-anonymous channels. In: Proc. of CNIS, pp. 126-131. IASTED (2003)
-
(2003)
Proc. of CNIS
, pp. 126-131
-
-
Moskowitz, I.S.1
Newman, R.E.2
Syverson, P.F.3
-
26
-
-
84947756322
-
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
-
Progress in Cryptology - INDOCRYPT 2000
-
Pliam, J.O.: On the incomparability of entropy and marginal guesswork in bruteforce attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000) (Pubitemid 33210840)
-
(2000)
Lecture Notes in Computer Science
, Issue.1977
, pp. 67-79
-
-
Pliam, J.O.1
-
28
-
-
84856043672
-
A mathematical theory of communication
-
625-656
-
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 625-656 (1948)
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
29
-
-
68549087948
-
On the foundations of quantitative information flow
-
In: de Alfaro, L. (ed.) Springer, Heidelberg
-
Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
-
(2009)
FOSSACS 2009. LNCS
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
30
-
-
27944454436
-
Anonymity vs. information leakage in anonymity systems
-
IEEE, Los Alamitos
-
Zhu, Y., Bettati, R.: Anonymity vs. information leakage in anonymity systems. In: Proc. of ICDCS, pp. 514-524. IEEE, Los Alamitos (2005)
-
(2005)
Proc. of ICDCS
, pp. 514-524
-
-
Zhu, Y.1
Bettati, R.2
|