-
1
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429-444 (1977)
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
2
-
-
33746335051
-
Differential Privacy
-
Bugliesi, M., Preneel, B., Sassone, V.,Wegener, I. (eds.) ICALP 2006, Part II. Springer, Heidelberg
-
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V.,Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
3
-
-
77951688595
-
Differential privacy in new settings
-
SIAM
-
Dwork, C.: Differential privacy in new settings. In: Proc. of the Twenty-First Annual ACMSIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, pp. 174-183. SIAM (2010)
-
(2010)
Proc. of the Twenty-First Annual ACMSIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19
, pp. 174-183
-
-
Dwork, C.1
-
4
-
-
78650804208
-
A firm foundation for private data analysis
-
Dwork, C.: A firm foundation for private data analysis. Communications of the ACM 54(1), 86-96 (2011)
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
, pp. 86-96
-
-
Dwork, C.1
-
5
-
-
70350682013
-
Differential privacy and robust statistics
-
ACM
-
Dwork, C., Lei, J.: Differential privacy and robust statistics. In: Proc. of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31-June 2, pp. 371-380. ACM (2009)
-
(2009)
Proc. of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31-June 2
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
6
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Elsevier
-
Clark, D., Hunt, S.,Malacaria, P.: Quantitative analysis of the leakage of confidential data. In: Proc. of QAPL. Electr. Notes Theor. Comput. Sci., vol. 59(3), pp. 238-251. Elsevier (2001)
-
(2001)
Proc. of QAPL. Electr. Notes Theor. Comput. Sci.
, vol.59
, Issue.3
, pp. 238-251
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. J. of Logic and Computation 18(2), 181-199 (2005)
-
(2005)
J. of Logic and Computation
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
8
-
-
70449455866
-
Belief in information flow
-
Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. J. of Comp. Security 17(5), 655-701 (2009)
-
(2009)
J. of Comp. Security 17
, vol.17
, Issue.5
, pp. 655-701
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
9
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
ACM
-
Köpf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Proc. of CCS, pp. 286-296. ACM (2007)
-
(2007)
Proc. of CCS
, pp. 286-296
-
-
Köpf, B.1
Basin, D.A.2
-
10
-
-
33846535380
-
Assessing security threats of looping constructs
-
ACM
-
Malacaria, P.: Assessing security threats of looping constructs. In: Proc. of POPL, pp. 225-235. ACM (2007)
-
(2007)
Proc. of POPL
, pp. 225-235
-
-
Malacaria, P.1
-
11
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
ACM
-
Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: Proc. of PLAS, pp. 135-146. ACM (2008)
-
(2008)
Proc. of PLAS
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
12
-
-
68549087948
-
On the Foundations of Quantitative Information Flow
-
de Alfaro, L. (ed.) FOSSACS 2009. Springer, Heidelberg
-
Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
13
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 625-656 (1948)
-
(1948)
Bell System Technical Journal
, vol.27
, Issue.379-423
, pp. 625-656
-
-
Shannon, C.E.1
-
16
-
-
68549126859
-
Quantitative notions of leakage for one-try attacks
-
Elsevier
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proc. of MFPS. ENTCS, vol. 249, pp. 75-91. Elsevier (2009)
-
(2009)
Proc. of MFPS. ENTCS
, vol.249
, pp. 75-91
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
17
-
-
47249145678
-
Compositional Methods for Information-Hiding
-
Amadio, R.M. (ed.) FOSSACS 2008. Springer, Heidelberg
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional Methods for Information-Hiding. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4962
, pp. 443-457
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
18
-
-
54349091549
-
On the Bayes risk in information-hiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the Bayes risk in information-hiding protocols. J. of Comp. Security 16(5), 531-571 (2008)
-
(2008)
J. of Comp. Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
19
-
-
57949117235
-
A note on differential privacy: Defining resistance to arbitrary side information
-
abs/0803.3946
-
Kasiviswanathan, S.P., Smith, A.: A note on differential privacy: Defining resistance to arbitrary side information. CoRR abs/0803.3946 (2008)
-
(2008)
CoRR
-
-
Kasiviswanathan, S.P.1
Smith, A.2
-
20
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
ACM
-
Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proc. of the 41st Annual ACMSymposium on Theory of Computing, STOC 2009, pp. 351-360. ACM (2009)
-
(2009)
Proc. of the 41st Annual ACMSymposium on Theory of Computing, STOC 2009
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
21
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
22
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
Johnson, D.S., Feige, U. (eds.) ACM
-
Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Johnson, D.S., Feige, U. (eds.) STOC, pp. 75-84. ACM (2007)
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
24
-
-
79959951821
-
-
Technical report
-
Alvim, M.S., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential privacy versus quantitative information flow. Technical report (2010)
-
(2010)
Differential Privacy Versus Quantitative Information Flow
-
-
Alvim, M.S.1
Chatzikokolakis, K.2
Degano, P.3
Palamidessi, C.4
-
25
-
-
80052677847
-
Information-theoretic bounds for differentially private mechanisms
-
to appear
-
Barthe, G., Köpf, B.: Information-theoretic bounds for differentially private mechanisms. In: Proc. of CSF (to appear, 2011)
-
(2011)
Proc. of CSF
-
-
Barthe, G.1
Köpf, B.2
-
27
-
-
77953239541
-
Applied Quantitative Information Flow and Statistical Databases
-
Degano, P., Guttman, J.D. (eds.) FAST 2009. Springer, Heidelberg
-
Heusser, J., Malacaria, P.: Applied Quantitative Information Flow and Statistical Databases. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 96-110. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5983
, pp. 96-110
-
-
Heusser, J.1
Malacaria, P.2
|