-
1
-
-
67349233028
-
Proofs of randomized algorithms in Coq
-
P. Audebaud and C. Paulin-Mohring. Proofs of randomized algorithms in Coq. Sci. Comput. Program., 74(8):568-589, 2009.
-
(2009)
Sci. Comput. Program.
, vol.74
, Issue.8
, pp. 568-589
-
-
Audebaud, P.1
Paulin-Mohring, C.2
-
2
-
-
80052677847
-
Information-theoretic bounds for differentially private mechanisms
-
Los Alamitos. IEEE Computer Society
-
G. Barthe and B. Köpf. Information-theoretic bounds for differentially private mechanisms. In 24rd IEEE Computer Security Foundations Symposium, CSF 2011, pages 191-204, Los Alamitos, 2011. IEEE Computer Society.
-
(2011)
24rd IEEE Computer Security Foundations Symposium, CSF 2011
, pp. 191-204
-
-
Barthe, G.1
Köpf, B.2
-
3
-
-
70350323754
-
Formal certification of code-based cryptographic proofs
-
New York. ACM
-
G. Barthe, B. Grégoire, and S. Zanella Béguelin. Formal certification of code-based cryptographic proofs. In 36th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, POPL 2009, pages 90-101, New York, 2009. ACM.
-
(2009)
36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Zanella Béguelin, S.3
-
4
-
-
80051978821
-
Computer-aided security proofs for the working cryptographer
-
Lecture Notes in Computer Science, Heidelberg. Springer
-
G. Barthe, B. Grégoire, S. Heraud, and S. Zanella Béguelin. Computer-aided security proofs for the working cryptographer. In Ad-vances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 71-90, Heidelberg, 2011. Springer.
-
(2011)
Ad-vances in Cryptology - CRYPTO 2011
, vol.6841
, pp. 71-90
-
-
Barthe, G.1
Grégoire, B.2
Heraud, S.3
Zanella Béguelin, S.4
-
5
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Lecture Notes in Computer Science, Heidelberg. Springer
-
A. Beimel, K. Nissim, and E. Omri. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology -CRYPTO 2008, volume 5157 of Lecture Notes in Computer Science, pages 451-468, Heidelberg, 2008. Springer.
-
(2008)
Advances in Cryptology -CRYPTO 2008
, vol.5157
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
6
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
4004 LNCS, DOI 10.1007/11761679-25, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
M. Bellare and P. Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. In Advances in Cryptology - EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 409-426, Heidelberg, 2006. Springer. (Pubitemid 44072253)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
77955334135
-
Private and continual release of statistics
-
Lecture Notes in Computer Science, Heidelberg. Springer
-
T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. In 37th International colloquium on Automata, Languages and Programming, ICALP 2010, volume 6199 of Lecture Notes in Computer Science, pages 405-417, Heidelberg, 2010. Springer.
-
(2010)
37th International Colloquium on Automata, Languages and Programming, ICALP 2010
, vol.6199
, pp. 405-417
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
9
-
-
80053201999
-
Proving programs robust
-
ACM
-
S. Chaudhuri, S. Gulwani, R. Lublinerman, and S. Navidpour. Proving programs robust. In 8th joint meeting of the European Software Engi-neering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE '11. ACM, 2011.
-
(2011)
8th Joint Meeting of the European Software Engi-neering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE '11
-
-
Chaudhuri, S.1
Gulwani, S.2
Lublinerman, R.3
Navidpour, S.4
-
10
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007. (Pubitemid 46868450)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
12
-
-
56849104494
-
Approximate analysis of probabilistic processes: Logic, simulation and games
-
IEEE Computer Society
-
J. Desharnais, F. Laviolette, and M. Tracol. Approximate analysis of probabilistic processes: Logic, simulation and games. In 5th International Conference on Quantitative Evaluation of Systems, QEST 2008, pages 264-273. IEEE Computer Society, 2008.
-
(2008)
5th International Conference on Quantitative Evaluation of Systems, QEST 2008
, pp. 264-273
-
-
Desharnais, J.1
Laviolette, F.2
Tracol, M.3
-
13
-
-
33746335051
-
Differential privacy
-
4052 LNCS, DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork. Differential privacy. In 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006, volume 4052 of Lecture Notes in Computer Science, pages 1-12, Heidelberg, 2006. Springer. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 1-12
-
-
Dwork, C.1
-
14
-
-
70349305273
-
Differential privacy: A survey of results
-
Lecture Notes in Computer Science, Heidelberg. Springer
-
C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, volume 4978 of Lecture Notes in Computer Science, pages 1-19, Heidelberg, 2008. Springer.
-
(2008)
Theory and Applications of Models of Computation
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
15
-
-
78650804208
-
A firm foundation for private data analysis
-
January
-
C. Dwork. A firm foundation for private data analysis. Commun. ACM, 54(1):86-95, January 2011.
-
(2011)
Commun. ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
16
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
4004 LNCS, DOI 10.1007/11761679-29, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology - EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 486-503, Heidelberg, 2006. Springer. (Pubitemid 44072257)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
17
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
3876 LNCS, DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In 3rd Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 265-284, Heidelberg, 2006. Springer. (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
18
-
-
77951678087
-
Differentially private combinatorial optimization
-
SIAM
-
A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Talwar. Differentially private combinatorial optimization. In 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pages 1106-1125. SIAM, 2010.
-
(2010)
21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010
, pp. 1106-1125
-
-
Gupta, A.1
Ligett, K.2
McSherry, F.3
Roth, A.4
Talwar, K.5
-
19
-
-
27744471200
-
Probabilistic guarded commands mechanized in HOL
-
DOI 10.1016/j.tcs.2005.08.005, PII S0304397505004767
-
J. Hurd, A. McIver, and C. Morgan. Probabilistic guarded commands mechanized in HOL. Theor. Comput. Sci., 346(1):96-112, 2005. (Pubitemid 41606836)
-
(2005)
Theoretical Computer Science
, vol.346
, Issue.1
, pp. 96-112
-
-
Hurd, J.1
McIver, A.2
Morgan, C.3
-
20
-
-
0005411712
-
Probabilistic extensions of process algebras
-
J. Bergstra, A. Ponse, and S. Smolka, editors. Elsevier, Amsterdam
-
B. Jonsson, W. Yi, and K. G. Larsen. Probabilistic extensions of process algebras. In J. Bergstra, A. Ponse, and S. Smolka, editors, Handbook of Process Algebra, pages 685-710. Elsevier, Amsterdam, 2001.
-
(2001)
Handbook of Process Algebra
, pp. 685-710
-
-
Jonsson, B.1
Yi, W.2
Larsen, K.G.3
-
24
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
New York. ACM
-
F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In 35th SIGMOD international conference on Management of Data, SIGMOD 2009, pages 19-30, New York, 2009. ACM.
-
(2009)
35th SIGMOD International Conference on Management of Data, SIGMOD 2009
, pp. 19-30
-
-
McSherry, F.D.1
-
25
-
-
70350338483
-
Computational differential privacy
-
Lecture Notes in Computer Science, Heidelberg. Springer
-
I. Mironov, O. Pandey, O. Reingold, and S. Vadhan. Computational differential privacy. In Advances in Cryptology - CRYPTO 2009, volume 5677 of Lecture Notes in Computer Science, pages 126-142, Heidelberg, 2009. Springer.
-
(2009)
Advances in Cryptology - CRYPTO 2009
, vol.5677
, pp. 126-142
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.4
-
26
-
-
0344875573
-
Approximate noninterference
-
A. D. Pierro, C. Hankin, and H. Wiklicky. Approximate noninterference. Journal ofComputer Security, 12(1):37-82, 2004.
-
(2004)
Journal OfComputer Security
, vol.12
, Issue.1
, pp. 37-82
-
-
Pierro, A.D.1
Hankin, C.2
Wiklicky, H.3
-
27
-
-
4444251918
-
A simple probabilistic approximation algorithm for vertex cover
-
Yale University
-
L. Pitt. A simple probabilistic approximation algorithm for vertex cover. Technical Report TR-404, Yale University, 1985.
-
(1985)
Technical Report TR-404
-
-
Pitt, L.1
-
30
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
Berkeley. USENIX Association
-
I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: security and privacy for MapReduce. In 7th USENIX conference on Networked Systems Design and Implementation, NSDI 2010, pages 297-312, Berkeley, 2010. USENIX Association.
-
(2010)
7th USENIX Conference on Networked Systems Design and Implementation, NSDI 2010
, pp. 297-312
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
33
-
-
33646037706
-
Secure information flow as a safety problem
-
Lecture Notes in Computer Science, Heidelberg. Springer
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In 12th International Symposium on Static Analysis, SAS 2005, volume 3672 of Lecture Notes in Computer Science, pages 352-367, Heidelberg, 2005. Springer.
-
(2005)
12th International Symposium on Static Analysis, SAS 2005
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
|