메뉴 건너뛰기




Volumn 117, Issue , 2013, Pages 1-18

Preserving differential privacy under finite-precision semanticss

Author keywords

Differential privacy; Floating point arithmetic; Robustness to errors

Indexed keywords

DIGITAL ARITHMETIC; LAPLACE TRANSFORMS;

EID: 84889050331     PISSN: 20752180     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4204/EPTCS.117.1     Document Type: Conference Paper
Times cited : (8)

References (22)
  • 1
    • 84866891785 scopus 로고    scopus 로고
    • Measuring information leakage using generalized gain functions
    • Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi & Geoffrey Smith (2012): Measuring Information Leakage Using Generalized Gain Functions. In: Proc. of CSF, pp. 265-279, doi:10.1109/CSF.2012.26.
    • (2012) Proc. of CSF , pp. 265-279
    • Alvim, M.S.1    Chatzikokolakis, K.2    Palamidessi, C.3    Smith, G.4
  • 2
    • 84888993369 scopus 로고    scopus 로고
    • Geo-indistinguishability: Differential privacy for location-based systems
    • Av. at arXiv:1212.1984
    • Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis & Catuscia Palamidessi (2012): Geo-Indistinguishability: Differential Privacy for Location-Based Systems. Technical Report. Av. at arXiv:1212.1984.
    • (2012) Technical Report
    • Andrés, M.E.1    Bordenabe, N.E.2    Chatzikokolakis, K.3    Palamidessi, C.4
  • 3
    • 84857867264 scopus 로고    scopus 로고
    • Probabilistic relational reasoning for differential privacy
    • ACM
    • Gilles Barthe, Boris Köpf, Federico Olmedo & Santiago Zanella Béguelin (2012): Probabilistic Relational Reasoning for Differential Privacy. In: Proc. of POPL, ACM, doi:10.1145/2103656.2103670.
    • (2012) Proc. of POPL
    • Barthe, G.1    Köpf, B.2    Olmedo, F.3    Béguelin, S.Z.4
  • 4
    • 68549126859 scopus 로고    scopus 로고
    • Quantitative notions of leakage for one-try attacks
    • ENTCS 249, Elsevier
    • Christelle Braun, Konstantinos Chatzikokolakis & Catuscia Palamidessi (2009): Quantitative Notions of Leakage for One-try Attacks. In: Proc. of MFPS, ENTCS 249, Elsevier, pp. 75-91, doi:10.1016/j.entcs.2009.07.085.
    • (2009) Proc. of MFPS , pp. 75-91
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 5
    • 61849176967 scopus 로고    scopus 로고
    • The ∞-wasserstein distance: Local solutions and existence of optimal transport maps
    • T. Champion, L. De Pascale & P. Juutinen (2008): The ∞-Wasserstein Distance: Local Solutions and Existence of Optimal Transport Maps. SIAM 40(1), pp. 1-20, doi:10.1137/07069938X.
    • (2008) SIAM , vol.40 , Issue.1 , pp. 1-20
    • Champion, T.1    De-Pascale, L.2    Juutinen, P.3
  • 7
    • 40149107259 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Konstantinos Chatzikokolakis, Catuscia Palamidessi & Prakash Panangaden (2008): Anonymity Protocols as Noisy Channels. Inf. and Comp. 206(2-4), pp. 378-401, doi:10.1016/j.ic.2007.07.003.
    • (2008) Inf. and Comp. , vol.206 , Issue.2-4 , pp. 378-401
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 9
    • 11344288540 scopus 로고    scopus 로고
    • Quantified interference for a while language
    • ENTCS 112, Elsevier
    • David Clark, Sebastian Hunt & Pasquale Malacaria (2005): Quantified Interference for a While Language. In: Proc. of QAPL, ENTCS 112, Elsevier, pp. 149-166, doi:10.1016/j.entcs.2004.01.018.
    • (2005) Proc. of QAPL , pp. 149-166
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 10
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • LNCS, Springer
    • Cynthia Dwork (2006): Differential Privacy. In: Proc. of ICALP, LNCS 4052, Springer, pp. 1-12, doi:10.1007/11787006-1.
    • (2006) Proc. of ICALP , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 11
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • LNCS, Springer
    • Cynthia Dwork, Frank Mcsherry, Kobbi Nissim & Adam Smith (2006): Calibrating noise to sensitivity in private data analysis. In: Proc. of TCC, LNCS 3876, Springer, pp. 265-284, doi:10.1007/11681878-14.
    • (2006) Proc. of TCC , vol.3876 , pp. 265-284
    • Dwork, C.1    Mcsherry, F.2    Nissim, K.3    Smith, A.4
  • 13
    • 85030164928 scopus 로고    scopus 로고
    • A non-localmethod for robustness analysis of floating point programs
    • INRIA
    • Ivan Gazeau, Dale Miller & Catuscia Palamidessi (2012): A non-localmethod for robustness analysis of floating point programs. Technical Report, INRIA. Available at http://hal.inria.fr/hal-00665995.
    • (2012) Technical Report
    • Gazeau, I.1    Miller, D.2    Palamidessi, C.3
  • 14
    • 85030164338 scopus 로고    scopus 로고
    • Preserving differential privacy under finiteprecision semantics
    • INRIA
    • Ivan Gazeau, Dale Miller & Catuscia Palamidessi (2013): Preserving differential privacy under finiteprecision semantics. Technical Report, INRIA. Available at http://hal.inria.fr/hal-00780774.
    • (2013) Technical Report
    • Gazeau, I.1    Miller, D.2    Palamidessi, C.3
  • 15
    • 84555217817 scopus 로고    scopus 로고
    • Differential privacy for location pattern mining
    • ACM
    • Shen-Shyang Ho & Shuhua Ruan (2011): Differential privacy for location pattern mining. In: Proc. of SPRINGL, ACM, pp. 17-24, doi:10.1145/2071880.2071884.
    • (2011) Proc. of SPRINGL , pp. 17-24
    • Ho, S.-S.1    Ruan, S.2
  • 18
    • 33846535380 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • Pasquale Malacaria (2007): Assessing security threats of looping constructs. In: Proc. of POPL, ACM, pp. 225-235, doi:10.1145/1190216.1190251.
    • (2007) Proc. of POPL, ACM , pp. 225-235
    • Malacaria, P.1
  • 19
    • 84869429647 scopus 로고    scopus 로고
    • On significance of the least significant bits for differential privacy
    • ACM, New York, NY, USA
    • Ilya Mironov (2012): On significance of the least significant bits for differential privacy. In: Proc. of, CCS '12, ACM, New York, NY, USA, pp. 650-661, doi:10.1145/2382196.2382264.
    • (2012) Proc. Of, CCS '12 , pp. 650-661
    • Mironov, I.1
  • 20
    • 70449632682 scopus 로고    scopus 로고
    • De-anonymizing social networks
    • Arvind Narayanan & Vitaly Shmatikov (2009): De-anonymizing Social Networks. In: Proc. of S&P, IEEE, pp. 173-187, doi:10.1109/SP.2009.22.
    • (2009) Proc. of S&P, IEEE , pp. 173-187
    • Narayanan, A.1    Shmatikov, V.2
  • 22
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • LNCS, Springer
    • Geoffrey Smith (2009): On the Foundations of Quantitative Information Flow. In: Proc. of FOSSACS, LNCS 5504, Springer, pp. 288-302, doi:10.1007/978-3-642-00596-1-21.
    • (2009) Proc. of FOSSACS , vol.5504 , pp. 288-302
    • Smith, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.