-
1
-
-
84862614907
-
Pseudorandom generators with long stretch and low locality from random local one-way functions
-
Applebaum, B. Pseudorandom generators with long stretch and low locality from random local one-way functions. In STOC (2012), pp. 805-816.
-
(2012)
STOC
, pp. 805-816
-
-
Applebaum, B.1
-
2
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Blum, A., Ligett, K., and Roth, A. A learning theory approach to non-interactive database privacy. In STOC (2008), pp. 609-618.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
3
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
Boneh, D., Sahai, A., and Waters, B. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT (2006), pp. 573-592.
-
(2006)
EUROCRYPT
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Boneh, D., and Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44, 5 (1998), 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
84985922619
-
Tracing traitors
-
Chor, B., Fiat, A., and Naor, M. Tracing traitors. In CRYPTO (1994), pp. 257-270.
-
(1994)
CRYPTO
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
6
-
-
1142275486
-
Revealing information while preserving privacy
-
Dinur, I., and Nissim, K. Revealing information while preserving privacy. In PODS (2003).
-
(2003)
PODS
-
-
Dinur, I.1
Nissim, K.2
-
7
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In TCC '06 (2006), pp. 265-284.
-
(2006)
TCC '06
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
8
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
Dwork, C., Naor, M., Reingold, O., Rothblum, G. N., and Vadhan, S. P. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC '09 (2009).
-
(2009)
STOC '09
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.P.5
-
9
-
-
84879818139
-
The privacy of the analyst and the power of the state
-
Dwork, C., Naor, M., and Vadhan, S. The privacy of the analyst and the power of the state. Manuscript (2012).
-
(2012)
Manuscript
-
-
Dwork, C.1
Naor, M.2
Vadhan, S.3
-
10
-
-
78751522594
-
Boosting and differential privacy
-
IEEE Computer Society
-
Dwork, C., Rothblum, G. N., and Vadhan, S. P. Boosting and differential privacy. In FOCS (2010), IEEE Computer Society, pp. 51-60.
-
(2010)
FOCS
, pp. 51-60
-
-
Dwork, C.1
Rothblum, G.N.2
Vadhan, S.P.3
-
11
-
-
79959740503
-
Privately releasing conjunctions and the statistical query barrier
-
Gupta, A., Hardt, M., Roth, A., and Ullman, J. Privately releasing conjunctions and the statistical query barrier. In STOC '11 (2011), pp. 803-812.
-
(2011)
STOC '11
, pp. 803-812
-
-
Gupta, A.1
Hardt, M.2
Roth, A.3
Ullman, J.4
-
12
-
-
84863421549
-
Iterative constructions and private data release
-
Gupta, A., Roth, A., and Ullman, J. Iterative constructions and private data release. In TCC (2012), pp. 339-356.
-
(2012)
TCC
, pp. 339-356
-
-
Gupta, A.1
Roth, A.2
Ullman, J.3
-
13
-
-
84877755332
-
A simple and practical algorithm for differentially private data release
-
Hardt, M., Ligett, K., and McSherry, F. A simple and practical algorithm for differentially private data release. NIPS '12 (2012).
-
(2012)
NIPS '12
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
14
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
Hardt, M., and Rothblum, G. N. A multiplicative weights mechanism for privacy-preserving data analysis. In FOCS (2010).
-
(2010)
FOCS
-
-
Hardt, M.1
Rothblum, G.N.2
-
15
-
-
84860187793
-
Private data release via learning thresholds
-
Hardt, M., Rothblum, G. N., and Servedio, R. A. Private data release via learning thresholds. In SODA (2012), pp. 168-187.
-
(2012)
SODA
, pp. 168-187
-
-
Hardt, M.1
Rothblum, G.N.2
Servedio, R.A.3
-
17
-
-
77954745685
-
Interactive privacy via the median mechanism
-
Roth, A., and Roughgarden, T. Interactive privacy via the median mechanism. In STOC '10 (2010), pp. 765-774.
-
(2010)
STOC '10
, pp. 765-774
-
-
Roth, A.1
Roughgarden, T.2
-
18
-
-
43949123848
-
Optimal probabilistic fingerprint codes
-
Tardos, G. Optimal probabilistic fingerprint codes. J. ACM 55, 2 (2008).
-
(2008)
J. ACM 55
, vol.2
-
-
Tardos, G.1
-
19
-
-
84879815183
-
Faster algorithms for privately releasing marginals
-
Thaler, J., Ullman, J., and Vadhan, S. P. Faster algorithms for privately releasing marginals. In ICALP (1) (2012), pp. 810-821.
-
(2012)
ICALP
, Issue.1
, pp. 810-821
-
-
Thaler, J.1
Ullman, J.2
Vadhan, S.P.3
-
21
-
-
79953172891
-
PCPs and the hardness of generating private synthetic data
-
Ullman, J., and Vadhan, S. P. PCPs and the hardness of generating private synthetic data. In TCC '11 (2011), pp. 400-416.
-
(2011)
TCC '11
, pp. 400-416
-
-
Ullman, J.1
Vadhan, S.P.2
|