Our Data, Ourselves: Privacy Via Distributed Noise Generation
暂无分享,去创建一个
Moni Naor | Cynthia Dwork | Krishnaram Kenthapadi | Ilya Mironov | Frank McSherry | C. Dwork | M. Naor | Frank McSherry | Ilya Mironov | K. Kenthapadi
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[3] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[4] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[5] Oded Goldreich,et al. The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) , 1985, FOCS.
[6] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[7] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[8] Avi Wigderson,et al. Dispersers, deterministic amplification, and weak random sources , 1989, 30th Annual Symposium on Foundations of Computer Science.
[9] Mihir Bellare,et al. Distributed pseudo-random bit generators—a new way to speed-up shared coin tossing , 1996, PODC '96.
[10] Moni Naor,et al. Digital signets: self-enforcing protection of digital information (preliminary version) , 1996, STOC '96.
[11] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[12] Luca Trevisan,et al. Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[13] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[14] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[15] Ronen Shaltiel,et al. Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.
[16] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[17] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[18] C. Dwork,et al. On the Utility of Privacy-Preserving Histograms , 2004 .
[19] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[20] Ran Raz,et al. Deterministic extractors for bit-fixing sources by obtaining an independent seed , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[21] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[22] Hoeteck Wee,et al. Toward Privacy in Public Databases , 2005, TCC.
[23] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[24] Cynthia Dwork,et al. On Privacy-Preserving Histograms , 2005, UAI.
[25] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[26] Ran Raz,et al. Deterministic Extractors for Bit-Fixing Sources by Obtaining an Independent Seed , 2006, SIAM J. Comput..
[27] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[28] David Zuckerman,et al. DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .