-
3
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
4
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, pages 1-12, 2006.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
5
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
6
-
-
51849089628
-
New efficient attacks on statistical disclosure control mechanisms
-
C. Dwork and S. Yekhanin. New efficient attacks on statistical disclosure control mechanisms. Advances in Cryptology-CRYPTO 2008, pages 469-480, 2008.
-
(2008)
Advances in Cryptology-CRYPTO 2008
, pp. 469-480
-
-
Dwork, C.1
Yekhanin, S.2
-
7
-
-
77952773793
-
Privacy in search logs
-
abs/0904.0682
-
M. Götz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke. Privacy in search logs. CoRR, abs/0904.0682, 2009.
-
(2009)
CoRR
-
-
Götz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
8
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate Estimation of the Degree Distribution of Private Networks. In ICDM, pages 169-178, 2009.
-
(2009)
ICDM
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
9
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
September
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow., 3:1021-1032, September 2010.
-
(2010)
Proc. VLDB Endow.
, vol.3
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
10
-
-
84865663496
-
Releasing search queries and clicks privately
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, pages 171-180, 2009.
-
(2009)
WWW
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
11
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006.
-
(2006)
ICDE
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
12
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, pages 106-115, 2007.
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
13
-
-
33749607006
-
ℓ-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. In ICDE, page 24, 2006.
-
(2006)
ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
14
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, 2007.
-
(2007)
FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
15
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In S&P, pages 111-125, 2008.
-
(2008)
S&P
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
|