메뉴 건너뛰기




Volumn , Issue , 2013, Pages 287-301

Verified computational differential privacy with applications to smart metering

Author keywords

aggregation; differential privacy; EasyCrypt; Hamming distance; smart meters

Indexed keywords

COMPUTATIONAL MODEL; DIFFERENTIAL PRIVACIES; DISTRIBUTED PROTOCOLS; EASYCRYPT; PROBABILISTIC COMPUTATION; PROGRAM EQUIVALENCE; SECURITY PROPERTIES; TWO-PARTY PROTOCOLS;

EID: 84884999092     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2013.26     Document Type: Conference Paper
Times cited : (80)

References (46)
  • 15
    • 84865442694 scopus 로고    scopus 로고
    • Logical, metric, and algorithmic characterisations of probabilistic bisimulation
    • March
    • Y. Deng and W. Du, "Logical, metric, and algorithmic characterisations of probabilistic bisimulation, " Carnegie Mellon University, Tech. Rep. CMU-CS-11-110, March 2011.
    • (2011) Carnegie Mellon University, Tech. Rep. CMU-CS-11-110
    • Deng, Y.1    Du, W.2
  • 17
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Heidelberg: Springer 33rd International Colloquium on Automata, Languages and Programming
    • C. Dwork, "Differential privacy, " in 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006, ser. Lecture Notes in Computer Science, vol. 4052. Heidelberg: Springer, 2006, pp. 1-12.
    • (2006) ICALP 2006, Ser. Lecture Notes in Computer Science , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 21
    • 84871605204 scopus 로고    scopus 로고
    • Universally utility-maximizing privacy mechanisms
    • A. Ghosh, T. Roughgarden, and M. Sundararajan, "Universally utility-maximizing privacy mechanisms, " SIAM J. Comput., vol. 41, no. 6, pp. 1673-1693, 2012.
    • (2012) SIAM J. Comput. , vol.41 , Issue.6 , pp. 1673-1693
    • Ghosh, A.1    Roughgarden, T.2    Sundararajan, M.3
  • 26
    • 84948978867 scopus 로고    scopus 로고
    • An LCF-style interface between HOL and first-order logic
    • Lecture Notes in Artificial Intelligence. Heidelberg: Springer
    • J. Hurd, "An LCF-style interface between HOL and first-order logic, " in 18th International Conference on Automated Deduction, CADE-18, ser. Lecture Notes in Artificial Intelligence, vol. 2392. Heidelberg: Springer, 2002, pp. 134-138.
    • (2002) 18th International Conference on Automated Deduction, CADE-18, Ser. , vol.2392 , pp. 134-138
    • Hurd, J.1
  • 32
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • New York: ACM
    • F. D. McSherry, "Privacy integrated queries: an extensible platform for privacy-preserving data analysis, " in 35th SIGMOD International Conference on Management of Data, SIGMOD 2009. New York: ACM, 2009, pp. 19-30.
    • (2009) 35th SIGMOD International Conference on Management of Data, SIGMOD 2009 , pp. 19-30
    • McSherry, F.D.1
  • 33
    • 37449033344 scopus 로고    scopus 로고
    • Translating higher-order clauses to first-order clauses
    • J. Meng and L. C. Paulson, "Translating higher-order clauses to first-order clauses, " J. Autom. Reasoning, vol. 40, no. 1, pp. 35-60, 2008.
    • (2008) J. Autom. Reasoning , vol.40 , Issue.1 , pp. 35-60
    • Meng, J.1    Paulson, L.C.2
  • 36
    • 80051991049 scopus 로고    scopus 로고
    • Verification of information flow and access control policies with dependent types
    • IEEE Computer Society
    • A. Nanevski, A. Banerjee, and D. Garg, "Verification of information flow and access control policies with dependent types, " in 32nd IEEE Symposium on Security and Privacy, S&P 2011. IEEE Computer Society, 2011, pp. 165-179.
    • (2011) 32nd IEEE Symposium on Security and Privacy, S&P 2011 , pp. 165-179
    • Nanevski, A.1    Banerjee, A.2    Garg, D.3
  • 37


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.