-
1
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Advances in Cryptology - Crypto 2008, Springer
-
Amos Beimel, Kobbi Nissim, and Eran Omri. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology - Crypto 2008, volume 5157 of LNCS, pages 451-468. Springer, 2008.
-
(2008)
LNCS
, vol.5157
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
3
-
-
33746335051
-
Differential privacy
-
33rd Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, Springer
-
Cynthia Dwork. Differential privacy. In 33rd Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, volume 4052 of LNCS, pages 1-12. Springer, 2006.
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
4
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Advances in Cryptology - Eurocrypt 2006, Springer
-
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology - Eurocrypt 2006, volume 4004 of LNCS, pages 486-503. Springer, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
5
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
3rd Theory of Cryptography Conference - TCC 2006, Springer
-
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In 3rd Theory of Cryptography Conference - TCC 2006, volume 3876 of LNCS, pages 265-284. Springer, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
6
-
-
78649820323
-
Basic Applications
-
Cambridge University Press, Cambridge, UK
-
O. Goldreich. Foundations of Cryptography, vol. 2: Basic Applications. Cambridge University Press, Cambridge, UK, 2004.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
7
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. In 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229. ACM Press, 1987.
-
(1987)
19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
8
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster secure two-party computation using garbled circuits. In USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
10
-
-
78049357399
-
Secure multiparty computation for privacy-preserving data mining
-
Y. Lindell and B. Pinkas. Secure multiparty computation for privacy-preserving data mining. J. Privacy and Confidentiality, 1(1):59-98, 2009.
-
(2009)
J. Privacy and Confidentiality
, vol.1
, Issue.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
|