-
1
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets, " in SP'08. IEEE, 2008, pp. 111-125.
-
(2008)
SP'08. IEEE
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
2
-
-
33746335051
-
Differential privacy
-
Springer
-
C. Dwork, "Differential Privacy, " in ICALP'06, ser. LNCS. Springer, 2006, pp. 1-12.
-
(2006)
ICALP'06, Ser. LNCS
, pp. 1-12
-
-
Dwork, C.1
-
3
-
-
78249264133
-
Distance Makes the Types Grow stronger: A Calculus for Differential Privacy
-
J. Reed and B. C. Pierce, "Distance Makes the Types Grow stronger: A Calculus for Differential Privacy, " in ICFP'10. ACM, 2010, pp. 157-168.
-
(2010)
ICFP'10. ACM
, pp. 157-168
-
-
Reed, J.1
Pierce, B.C.2
-
4
-
-
84877898233
-
Linear dependent types for differential privacy
-
M. Gaboardi, A. Haeberlen, J. Hsu, A. Narayan, and B. C. Pierce, "Linear Dependent Types for Differential Privacy, " in POPL'13. ACM, 2013, pp. 357-370.
-
(2013)
POPL'13. ACM
, pp. 357-370
-
-
Gaboardi, M.1
Haeberlen, A.2
Hsu, J.3
Narayan, A.4
Pierce, B.C.5
-
5
-
-
84857188426
-
Probabilistic relational reasoning for differential privacy
-
G. Barthe, B. Köpf, F. Olmedo, and S. Zanella Béguelin, "Probabilistic Relational Reasoning for Differential Privacy, " in POPL'12. ACM, 2012, pp. 97-110.
-
(2012)
POPL'12. ACM
, pp. 97-110
-
-
Barthe, G.1
Köpf, B.2
Olmedo, F.3
Zanella Béguelin, S.4
-
6
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our Data, Ourselves: Privacy Via Distributed Noise Generation, " in EUROCRYPT'06, ser. LNCS. Springer, 2006, pp. 486-503.
-
(2006)
EUROCRYPT'06, Ser. LNCS.
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
7
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Springer
-
A. Beimel, K. Nissim, and E. Omri, "Distributed Private Data Analysis: Simultaneously Solving How and What, " in CRYPTO'08. Springer, 2008, pp. 451-468.
-
(2008)
CRYPTO'08
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
8
-
-
70350338483
-
Computational differential privacy
-
Springer
-
I. Mironov, O. Pandey, O. Reingold, and S. P. Vadhan, "Computational Differential Privacy, " in CRYPTO'09, ser. LNCS. Springer, 2009, pp. 126-142.
-
(2009)
CRYPTO'09, Ser. LNCS
, pp. 126-142
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.P.4
-
9
-
-
84865546831
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacy-Preserving Aggregation of Time-Series Data, " in NDSS'11. ISOC, 2011.
-
(2011)
NDSS'11. ISOC
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
10
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption, " in SIGMOD/PODS'10. ACM, 2010, pp. 735-746.
-
(2010)
SIGMOD/PODS'10. ACM
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
11
-
-
84885005178
-
Distributed private heavy hitters
-
abs/1202. 4910
-
J. Hsu, S. Khanna, and A. Roth, "Distributed Private Heavy Hitters, " CoRR, vol. abs/1202. 4910, 2012.
-
(2012)
CoRR
-
-
Hsu, J.1
Khanna, S.2
Roth, A.3
-
12
-
-
78751557330
-
The limits of two-party differential privacy
-
A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. P. Vadhan, "The Limits of Two-Party Differential Privacy, " in FOCS'10. IEEE, 2010, pp. 81-90.
-
(2010)
FOCS'10. IEEE
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.P.6
-
13
-
-
84910659277
-
Towards statistical queries over distributed private user data
-
R. Chen, A. Reznichenko, P. Francis, and J. Gehrke, "Towards Statistical Queries over Distributed Private User Data, " in NSDI'12. Usenix, 2012.
-
(2012)
NSDI'12. Usenix
-
-
Chen, R.1
Reznichenko, A.2
Francis, P.3
Gehrke, J.4
-
14
-
-
84885907344
-
What can we learn privately
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith, "What Can We Learn Privately?" in FOCS'08. IEEE, 2008.
-
(2008)
FOCS'08. IEEE
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
15
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating Noise to Sensitivity in Private Data Analysis, " in TCC'06, ser. LNCS. Springer, 2006, pp. 265-284.
-
(2006)
TCC'06, Ser. LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
16
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar, "Mechanism Design via Differential Privacy, " in FOCS'07. IEEE, 2007, pp. 94-103.
-
(2007)
FOCS'07. IEEE
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
17
-
-
84869441906
-
Non-tracking web analytics
-
I. E. Akkus, R. Chen, M. Hardt, P. Francis, and J. Gehrke, "Non-tracking Web Analytics, " in CCS'12. ACM, 2012, pp. 687-698.
-
(2012)
CCS'12. ACM
, pp. 687-698
-
-
Akkus, I.E.1
Chen, R.2
Hardt, M.3
Francis, P.4
Gehrke, J.5
-
19
-
-
51749098783
-
Refinement types for secure implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis, "Refinement Types for Secure Implementations, " in CSF'08. IEEE, 2008, pp. 17-32.
-
(2008)
CSF'08. IEEE
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
20
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Springer
-
M. Abadi and B. Blanchet, "Secrecy Types for Asymmetric Communication, " in FOSSACS'01, ser. LNCS, vol. 2030. Springer, 2001, pp. 25-41.
-
(2001)
FOSSACS'01, Ser. LNCS
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
21
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
B. Blanchet, "Automatic Proof of Strong Secrecy for Security Protocols, " in SP'04. IEEE, 2004, pp. 86-100.
-
(2004)
SP'04. IEEE
, pp. 86-100
-
-
Blanchet, B.1
-
22
-
-
80755169483
-
Modular code-based cryptographic verification
-
C. Fournet, M. Kohlweiss, and P.-Y. Strub, "Modular Code-Based Cryptographic Verification, " in CCS'11. ACM, 2011, pp. 341-350.
-
(2011)
CCS'11. ACM
, pp. 341-350
-
-
Fournet, C.1
Kohlweiss, M.2
Strub, P.-Y.3
-
23
-
-
85031939047
-
M-structures: Extending a parallel, non-strict, functional language with state
-
Springer
-
P. S. Barth, R. S. Nikhil, and Arvind, "M-structures: Extending a parallel, non-strict, functional language with state, " in FPCA'91. Springer, 1991, pp. 538-568.
-
(1991)
FPCA'91
, pp. 538-568
-
-
Barth, P.S.1
Nikhil, R.S.2
Arvind3
-
24
-
-
80052649937
-
Union and intersection types for secure protocol implementations
-
Springer
-
M. Backes, M. Maffei, and C. Hri̧tcu, "Union and Intersection Types for Secure Protocol Implementations, " in TOSCA'11, ser. LNCS. Springer, 2011, pp. 1-28.
-
(2011)
TOSCA'11, Ser. LNCS
, pp. 1-28
-
-
Backes, M.1
Maffei, M.2
Hri̧tcu, C.3
-
25
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. McSherry, "Privacy Integrated Queries: an Extensible Platform for Privacy-Preserving Data Analysis, " in SIGMOD/PODS'09. ACM, 2009, pp. 19-30.
-
(2009)
SIGMOD/PODS'09. ACM
, pp. 19-30
-
-
McSherry, F.1
-
26
-
-
0001306213
-
Efficient resource management for linear logic proof search
-
I. Cervesato, J. S. Hodas, and F. Pfenning, "Efficient Resource Management for Linear Logic Proof Search, " TCS, vol. 232, no. 1-2, pp. 133-163, 2000.
-
(2000)
TCS
, vol.232
, Issue.1-2
, pp. 133-163
-
-
Cervesato, I.1
Hodas, J.S.2
Pfenning, F.3
-
27
-
-
0015561577
-
Protection in programming languages
-
J. Morris, "Protection in Programming Languages, " CACM, vol. 16, no. 1, pp. 15-21, 1973.
-
(1973)
CACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris, J.1
-
28
-
-
34047126463
-
A bisimulation for dynamic sealing
-
E. Sumii and B. Pierce, "A Bisimulation for Dynamic Sealing, " TCS, vol. 375, no. 1-3, pp. 169-192, 2007.
-
(2007)
TCS
, vol.375
, Issue.1-3
, pp. 169-192
-
-
Sumii, E.1
Pierce, B.2
-
29
-
-
78650000256
-
Computationally sound verification of source code
-
M. Backes, M. Maffei, and D. Unruh, "Computationally Sound Verification of Source Code, " in Proc. 17th ACM Conference on Computer and Communications Security. ACM, 2010, pp. 387-398.
-
(2010)
Proc. 17th ACM Conference on Computer and Communications Security. ACM
, pp. 387-398
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
30
-
-
80054054746
-
Secure distributed programming with value-dependent types
-
N. Swamy, J. Chen, C. Fournet, P.-Y. Strub, K. Bhargavan, and J. Yang, "Secure Distributed Programming with Value-Dependent Types, " in ICFP'11. ACM, 2011, pp. 266-278.
-
(2011)
ICFP'11. ACM
, pp. 266-278
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Strub, P.-Y.4
Bhargavan, K.5
Yang, J.6
-
31
-
-
84874428530
-
Logical foundations of secure resource management in protocol implementations
-
Springer
-
M. Bugliesi, S. Calzavara, F. Eigner, and M. Maffei, "Logical Foundations of Secure Resource Management in Protocol Implementations, " in POST'13. Springer, 2013, pp. 105-125.
-
(2013)
POST'13
, pp. 105-125
-
-
Bugliesi, M.1
Calzavara, S.2
Eigner, F.3
Maffei, M.4
-
32
-
-
80054887187
-
Formal verification of differential privacy for interactive systems (extended abstract)
-
M. C. Tschantz, D. Kaynar, and A. Datta, "Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract), " ENTCS, vol. 276, pp. 61-79, 2011.
-
(2011)
ENTCS
, vol.276
, pp. 61-79
-
-
Tschantz, M.C.1
Kaynar, D.2
Datta, A.3
-
33
-
-
80053201999
-
Proving programs robust
-
S. Chaudhuri, S. Gulwani, R. Lublinerman, and S. Navidpour, "Proving Programs Robust, " in ESEC/FSE'11. ACM, 2011, pp. 102-112.
-
(2011)
ESEC/FSE'11. ACM
, pp. 102-112
-
-
Chaudhuri, S.1
Gulwani, S.2
Lublinerman, R.3
Navidpour, S.4
-
37
-
-
82955189853
-
Noiseless database privacy
-
Springer
-
R. Bhaskar, A. Bhowmick, V. Goyal, S. Laxman, and A. Thakurta, "Noiseless Database Privacy, " in ASIACRYPT'11. Springer, 2011, pp. 215-232.
-
(2011)
ASIACRYPT'11
, pp. 215-232
-
-
Bhaskar, R.1
Bhowmick, A.2
Goyal, V.3
Laxman, S.4
Thakurta, A.5
-
38
-
-
79953187235
-
Towards privacy for social networks: A zero-knowledge based definition of privacy
-
Springer
-
J. Gehrke, E. Lui, and R. Pass, "Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy, " in TCC'11. Springer, 2011, pp. 432-449.
-
(2011)
TCC'11
, pp. 432-449
-
-
Gehrke, J.1
Lui, E.2
Pass, R.3
-
39
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi, "Secrecy by Typing in Security Protocols, " JACM, vol. 46, no. 5, pp. 749-786, 1999.
-
(1999)
JACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
40
-
-
84865501766
-
Types for security protocols
-
IOS Press
-
R. Focardi and M. Maffei, "Types for Security Protocols, " in Formal Models and Techniques for Analyzing Security Protocol. IOS Press, 2010, vol. 5, ch. 7, pp. 143-181.
-
(2010)
Formal Models and Techniques for Analyzing Security Protocol
, vol.5
, Issue.7
, pp. 143-181
-
-
Focardi, R.1
Maffei, M.2
-
41
-
-
84885002098
-
Automated synthesis of privacy-preserving distributed applications
-
M. Backes, M. Maffei, and K. Pecina, "Automated Synthesis of Privacy-Preserving Distributed Applications, " in NDSS'12. ISOC, 2012.
-
(2012)
NDSS'12. ISOC
-
-
Backes, M.1
Maffei, M.2
Pecina, K.3
-
43
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey, "Authenticity by Typing for Security Protocols, " JCS, vol. 11, no. 4, pp. 451-519, 2003.
-
(2003)
JCS
, vol.11
, Issue.4
, pp. 451-519
-
-
Gordon, A.D.1
Jeffrey, A.2
-
44
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
-, "Types and Effects for Asymmetric Cryptographic Protocols, " JCS, vol. 12, no. 3, pp. 435-484, 2004.
-
(2004)
JCS
, vol.12
, Issue.3
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.2
-
45
-
-
34548820967
-
Dynamic types for authentication
-
M. Bugliesi, R. Focardi, and M. Maffei, "Dynamic Types for Authentication, " JCS, vol. 15, no. 6, pp. 563-617, 2007.
-
(2007)
JCS
, vol.15
, Issue.6
, pp. 563-617
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
46
-
-
21144444143
-
Compositional analysis of authentication protocols
-
Springer
-
-, "Compositional Analysis of Authentication Protocols, " in ESOP'04, ser. LNCS, vol. 2986. Springer, 2004, pp. 140-154.
-
(2004)
ESOP'04, Ser. LNCS
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
48
-
-
28144464907
-
Analysis of typed-based analyses of authentication protocols
-
-, "Analysis of Typed-Based Analyses of Authentication Protocols, " in CSFW'05. IEEE, 2005, pp. 112-125.
-
(2005)
CSFW'05. IEEE
, pp. 112-125
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
49
-
-
77950909049
-
Modular verification of security protocol code by typing
-
K. Bhargavan, C. Fournet, and A. D. Gordon, "Modular Verification of Security Protocol Code by Typing, " in POPL'10. ACM, 2010, pp. 445-456.
-
(2010)
POPL'10. ACM
, pp. 445-456
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
50
-
-
70349280183
-
Type-checking zero-knowledge
-
M. Backes, C. Hri̧tcu, and M. Maffei, "Type-checking Zero-knowledge, " in CCS'08. ACM, 2008, pp. 357-370.
-
(2008)
CCS'08. ACM
, pp. 357-370
-
-
Backes, M.1
Hri̧tcu, C.2
Maffei, M.3
-
51
-
-
80052669061
-
Resource-aware authorization policies in statically typed cryptographic protocols
-
M. Bugliesi, S. Calzavara, F. Eigner, and M. Maffei, "Resource-aware Authorization Policies in Statically Typed Cryptographic Protocols, " in CSF'11. IEEE, 2011, pp. 83-98.
-
(2011)
CSF'11. IEEE
, pp. 83-98
-
-
Bugliesi, M.1
Calzavara, S.2
Eigner, F.3
Maffei, M.4
-
52
-
-
77956247703
-
Type inference in intuitionistic linear logic
-
P. Baillot and M. Hofmann, "Type Inference in Intuitionistic Linear Logic, " in PPDP'10. ACM, 2010, pp. 219-230.
-
(2010)
PPDP'10. ACM
, pp. 219-230
-
-
Baillot, P.1
Hofmann, M.2
|