Limits of Computational Differential Privacy in the Client/Server Setting
暂无分享,去创建一个
Jonathan Katz | Arkady Yerukhimovich | Adam Groce | Jonathan Katz | Arkady Yerukhimovich | Adam Groce
[1] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[2] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[3] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[4] Luca Trevisan,et al. Notions of Reducibility between Cryptographic Primitives , 2004, TCC.
[5] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[6] Bounds on the Efficiency of Generic Cryptographic Constructions , 2005, SIAM J. Comput..
[7] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[8] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[9] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[10] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[11] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[12] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[13] A. Blum,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[14] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[15] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[16] Omer Reingold,et al. Computational Differential Privacy , 2009, CRYPTO.
[17] Toniann Pitassi,et al. The Limits of Two-Party Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.