-
1
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
TCC LNCS 3876, Springer, 2006
-
C. Dwork, F. McSherry, K. Nissim and A. Smith, Calibrating noise to sensitivity in private data analysis, in Proc. 3rd Theory of Cryptography Conf. (TCC 2006), LNCS 3876, Springer, 2006, pp. 265-284.
-
(2006)
Proc. 3rd Theory of Cryptography Conf.
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
2
-
-
33746335051
-
Differential privacy
-
LNCS 4052, Springer
-
C. Dwork, Differential privacy, in Automata, Languages and Programming (ICALP 2006), LNCS 4052, Springer, 2006, pp. 1-12.
-
(2006)
Automata, Languages and Programming (ICALP 2006)
, pp. 1-12
-
-
Dwork, C.1
-
3
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
ACM
-
K. Nissim, S. Raskhodnikova and A. Smith, Smooth sensitivity and sampling in private data analysis, in Proc. 39th annual ACM Symp. Theory of Computing (STOC 2007), ACM, 2007, pp. 75-84.
-
(2007)
Proc. 39th annual ACM Symp. Theory of Computing (STOC 2007)
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
5
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
ACM
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry and K. Talwar, Privacy, accuracy, and consistency too: a holistic solution to contingency table release, in Proc. 26th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS 2007), ACM, 2007, pp. 273-282.
-
(2007)
Proc. 26th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS 2007)
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
7
-
-
52649169678
-
Privacy: from theory to practice on the map
-
IEEE
-
A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke and L. Vilhuber, Privacy: from theory to practice on the map, in Proc. ICDE 2008, IEEE, 2008, pp. 277-286.
-
(2008)
Proc. ICDE 2008
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.3
Gehrke, J.4
Vilhuber, L.5
-
8
-
-
56749152260
-
How protective are synthetic data?
-
LNCS 5262, Springer
-
J. Abowd and L. Vilhuber, How protective are synthetic data?, in Privacy in Statistical Databases (PSD 2008), LNCS 5262, Springer, 2008, pp. 239-246.
-
(2008)
Privacy in Statistical Databases (PSD 2008)
, pp. 239-246
-
-
Abowd, J.1
Vilhuber, L.2
-
9
-
-
84867559122
-
How can we analyze differentially-private synthetic datasets?
-
A. Charest, How can we analyze differentially-private synthetic datasets?, J. Privacy and Confidentiality 2(2) (2010).
-
(2010)
J. Privacy and Confidentiality
, vol.2
, Issue.2
-
-
Charest, A.1
-
10
-
-
84949807262
-
-
Wiley
-
A. Hundepool, J. Domingo-Ferrer, L. Franconi, S. Giessing, E. Schulte Nordholt, K. Spicer and P.-P. de Wolf, Statistical Disclosure Control (Wiley, 2012).
-
(2012)
Statistical Disclosure Control
-
-
Hundepool, A.1
Domingo-Ferrer, J.2
Franconi, L.3
Giessing, S.4
Schulte Nordholt, E.5
Spicer, K.6
De Wolf, P.-P.7
-
11
-
-
84873689720
-
Differential privacy through knowledge refinement
-
Amsterdam, The Netherlands, September 3-6
-
J. Soria-Comas and J. Domingo-Ferrer, Differential privacy through knowledge refinement, in 2012 ASE/IEEE Int. Conf. Privacy, Security, Risk and Trust (PASSAT 2012), Amsterdam, The Netherlands, September 3-6, 2012.
-
(2012)
2012 ASE/IEEE Int. Conf. Privacy, Security, Risk and Trust (PASSAT 2012)
-
-
Soria-Comas, J.1
Domingo-Ferrer, J.2
-
12
-
-
79953250055
-
Evaluating Laplace noise addition to satisfy differential privacy for numeric data
-
R. Sarathy and K. Muralidhar, Evaluating Laplace noise addition to satisfy differential privacy for numeric data, Trans. Data Privacy 4(1) (2011) 1-17.
-
(2011)
Trans. Data Privacy
, vol.4
, Issue.1
, pp. 1-17
-
-
Sarathy, R.1
Muralidhar, K.2
-
13
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
LNCS 4004, Springer
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov and M. Naor, Our data, ourselves: privacy via distributed noise generation, in Advances in Cryptology (EUROCRYPT 2006), LNCS 4004, Springer, 2006, pp. 486-503.
-
(2006)
Advances in Cryptology (EUROCRYPT 2006)
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
|