-
1
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
New York, NY
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. Conf. Theory of Cryptography (TCC), New York, NY, 2006, pp. 265-284.
-
(2006)
Proc. Conf. Theory of Cryptography (TCC)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
2
-
-
33746335051
-
Differential privacy
-
Venice, Italy
-
C. Dwork, "Differential privacy," in Proc. Int. Conf. Automata, Languages and Programming (ICALP), Venice, Italy, 2006, pp. 1-12.
-
(2006)
Proc. Int. Conf. Automata, Languages and Programming (ICALP)
, pp. 1-12
-
-
Dwork, C.1
-
3
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Russia
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our data, ourselves: privacy via distributed noise generation," in Proc. Annu. Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), St. Petersburg, Russia, 2006, pp. 486-503.
-
(2006)
Proc. Annu. Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), St. Petersburg
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
4
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
San Diego, CA
-
K. Nissim, S. Raskhodnikova, and A. Smith, "Smooth sensitivity and sampling in private data analysis," in Proc. Ann. ACM Symp. Theory of Computing (STOC), San Diego, CA, 2007, pp. 75-84.
-
(2007)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
5
-
-
70350683770
-
Universally utilitymaximizing privacy mechanisms
-
Bethesda, MD
-
A. Ghosh, T. Roughgarden, and M. Sundararajan, "Universally utilitymaximizing privacy mechanisms," in Proc. Ann. ACM Symp. Theory of Computing (STOC), Bethesda, MD, 2009, pp. 351-360.
-
(2009)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
6
-
-
77954745685
-
Interactive privacy via the median mechanism
-
Cambridge, MA
-
A. Roth and T. Roughgarden, "Interactive privacy via the median mechanism," in Proc. Ann. ACM Symp. Theory of Computing (STOC), Cambridge, MA, 2010, pp. 765-774.
-
(2010)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 765-774
-
-
Roth, A.1
Roughgarden, T.2
-
7
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
Las Vegas, NV
-
M. Hardt and G. N. Rothblum, "A multiplicative weights mechanism for privacy-preserving data analysis," in Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS), Las Vegas, NV, 2010, pp. 61-70.
-
(2010)
Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS)
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
8
-
-
84862589671
-
Optimal private halfspace counting via discrepancy
-
New York, NY
-
S. Muthukrishnan and A. Nikolov, "Optimal private halfspace counting via discrepancy," in Proc. Ann. ACM Symp. Theory of Computing (STOC), New York, NY, 2012, pp. 1285-1292.
-
(2012)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 1285-1292
-
-
Muthukrishnan, S.1
Nikolov, A.2
-
9
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Victoria, Canada
-
A. Blum, K. Ligett, and A. Roth, "A learning theory approach to non-interactive database privacy," in Proc. Ann. ACM Symp. Theory of Computing (STOC), Victoria, Canada, 2008, pp. 609-618.
-
(2008)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
10
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
Bethesda, MD
-
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan, "On the complexity of differentially private data release: efficient algorithms and hardness results," in Proc. Ann. ACM Symp. Theory of Computing (STOC), Bethesda, MD, 2009, pp. 381-390.
-
(2009)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.5
-
11
-
-
77954693385
-
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
-
Cambridge, MA
-
S. Kasiviswanathan, M. Rudelson, A. Smith, and J. Ullman, "The price of privately releasing contingency tables and the spectra of random matrices with correlated rows," in Proc. Ann. ACM Symp. Theory of Computing (STOC), Cambridge, MA, 2010, pp. 775-784.
-
(2010)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 775-784
-
-
Kasiviswanathan, S.1
Rudelson, M.2
Smith, A.3
Ullman, J.4
-
12
-
-
79953172891
-
PCPs and the hardness of generating private synthetic data
-
Providence, RI
-
J. Ullman and S. Vadhan, "PCPs and the hardness of generating private synthetic data," in Proc. Conf. Theory of Cryptography (TCC), Providence, RI, 2011, pp. 400-416.
-
(2011)
Proc. Conf. Theory of Cryptography (TCC)
, pp. 400-416
-
-
Ullman, J.1
Vadhan, S.2
-
13
-
-
84877755332
-
A simple and practical algorithm for differentially private data release
-
Lake Tahoe, NV
-
M. Hardt, K. Ligett, and F. McSherry, "A simple and practical algorithm for differentially private data release," in Advances Neural Information Processing Systems (NIPS), Lake Tahoe, NV, 2012, pp. 2348-2356.
-
(2012)
Advances Neural Information Processing Systems (NIPS)
, pp. 2348-2356
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
14
-
-
84866008575
-
Differential identifiability
-
Beijing, China
-
J. Lee and C. Clifton, "Differential identifiability," in Proc. Ann. ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD), Beijing, China, 2012, pp. 1041-1049.
-
(2012)
Proc. Ann. ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD)
, pp. 1041-1049
-
-
Lee, J.1
Clifton, C.2
-
15
-
-
84889029677
-
Membership privacy: A unifying framework for privacy definitions
-
Berlin, Germany
-
N. Li, W. Qardaji, D. Su, Y. Wu, and W. Yang, "Membership privacy: A unifying framework for privacy definitions," in Proc. ACM Conf. Computer Communications Security (CCS), Berlin, Germany, 2013, pp. 889-900.
-
(2013)
Proc. ACM Conf. Computer Communications Security (CCS)
, pp. 889-900
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Wu, Y.4
Yang, W.5
-
16
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
Apr.
-
D. Clark, S. Hunt, and P. Malacaria, "Quantitative information flow, relations and polymorphic types," J. Log. and Comput., vol. 15, no. 2, pp. 181-199, Apr. 2005.
-
(2005)
J. Log. and Comput.
, vol.15
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
18
-
-
77951581039
-
Statistical measurement of information leakage
-
K. Chatzikokolakis, T. Chothia, and A. Guha, "Statistical measurement of information leakage," in Tools and Algorithms for the Constr. and Anal. of Syst., 2010, vol. 6015, pp. 390-404.
-
(2010)
Tools and Algorithms for the Constr. and Anal. of Syst.
, vol.6015
, pp. 390-404
-
-
Chatzikokolakis, K.1
Chothia, T.2
Guha, A.3
-
19
-
-
27944454436
-
Anonymity vs. Information leakage in anonymity systems
-
Columbus, OH
-
Y. Zhu and R. Bettati, "Anonymity vs. information leakage in anonymity systems," in Proc. IEEE Int. Conf. Distributed Computing Systems (ICDCS), Columbus, OH, 2005, pp. 514-524.
-
(2005)
Proc. IEEE Int. Conf. Distributed Computing Systems (ICDCS)
, pp. 514-524
-
-
Zhu, Y.1
Bettati, R.2
-
20
-
-
38149078755
-
Anonymity protocols as noisy channels
-
Lucca, Italy
-
K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, "Anonymity protocols as noisy channels," in Proc. Int. Conf. Trustworthy Global Computing (TGC), Lucca, Italy, 2007, pp. 281-300.
-
(2007)
Proc. Int. Conf. Trustworthy Global Computing (TGC)
, pp. 281-300
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
21
-
-
84878330331
-
Utility-privacy tradeoffs in databases: An information-theoretic approach
-
Jun.
-
L. Sankar, S. Rajagopalan, and H. Poor, "Utility-privacy tradeoffs in databases: An information-theoretic approach," IEEE Trans. Inf. Forens. Security, vol. 8, no. 6, pp. 838-852, Jun. 2013.
-
(2013)
IEEE Trans. Inf. Forens. Security
, vol.8
, Issue.6
, pp. 838-852
-
-
Sankar, L.1
Rajagopalan, S.2
Poor, H.3
-
22
-
-
84863951613
-
Differential privacy: On the trade-off between utility and information leakage
-
M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, P. Degano, and C. Palamidessi, "Differential privacy: On the trade-off between utility and information leakage," in Formal Aspects of Security and Trust, ser. Lecture Notes in Comput. Sci., 2012, vol. 7140, pp. 39-54.
-
(2012)
Formal Aspects of Security and Trust, Ser. Lecture Notes in Comput. Sci.
, vol.7140
, pp. 39-54
-
-
Alvim, M.S.1
Andrés, M.E.2
Chatzikokolakis, K.3
Degano, P.4
Palamidessi, C.5
-
23
-
-
84875954320
-
Information-theoretic foundations of differential privacy
-
D. J. Mir, "Information-theoretic foundations of differential privacy," in Found. and Practice of Security, ser. Lecture Notes in Comput. Sci., 2013, vol. 7743, pp. 374-381.
-
(2013)
Found. and Practice of Security, Ser. Lecture Notes in Comput. Sci.
, vol.7743
, pp. 374-381
-
-
Mir, D.J.1
-
24
-
-
78751557330
-
The limits of two-party differential privacy
-
Las Vegas, NV
-
A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. Vadhan, "The limits of two-party differential privacy," in Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS), Las Vegas, NV, 2010, pp. 81-90.
-
(2010)
Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS)
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.6
-
25
-
-
84923871062
-
-
arXiv:1402.3757 [cs.CR], Feb.
-
W. Wang, L. Ying, and J. Zhang, "On the relation between identifiability, differential privacy and mutual-information privacy," arXiv:1402.3757 [cs.CR], Feb. 2014.
-
(2014)
On the Relation between Identifiability, Differential Privacy and Mutual-information Privacy
-
-
Wang, W.1
Ying, L.2
Zhang, J.3
-
26
-
-
46749128577
-
Mechanism design via differential privacy
-
Providence, RI
-
F. McSherry and K. Talwar, "Mechanism design via differential privacy," in Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS), Providence, RI, 2007, pp. 94-103.
-
(2007)
Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS)
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
|