Privately Querying Privacy: Privacy Estimation with Guaranteed Privacy of User and Database Party
暂无分享,去创建一个
Ernst Althaus | Andreas Hildebrandt | Anna Katharina Hildebrandt | A. Hildebrandt | Ernst Althaus | A. Hildebrandt
[1] Ashwin Machanavajjhala,et al. PrivateSQL , 2019, Proceedings of the VLDB Endowment.
[2] Geoffroy Couteau,et al. New Protocols for Secure Equality Test and Comparison , 2018, ACNS.
[3] Benny Pinkas,et al. Private Set Intersection for Unequal Set Sizes with Mobile Applications , 2017, Proc. Priv. Enhancing Technol..
[4] Vladimir Kolesnikov,et al. Efficient Batched Oblivious PRF with Applications to Private Set Intersection , 2016, CCS.
[5] Gang Xu,et al. Secure multiparty computation of a comparison problem , 2016, SpringerPlus.
[6] Marc-Olivier Killijian,et al. XPIR : Private Information Retrieval for Everyone , 2016, Proc. Priv. Enhancing Technol..
[7] David Eckhoff,et al. Metrics : a Systematic Survey , 2018 .
[8] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[9] Oliver Diggelmann,et al. How the Right to Privacy Became a Human Right , 2014 .
[10] Eran Halperin,et al. Identifying Personal Genomes by Surname Inference , 2013, Science.
[11] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[12] Moti Yung,et al. Efficient robust private set intersection , 2009, Int. J. Appl. Cryptogr..
[13] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[14] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[15] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[16] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[17] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[18] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[19] Carroll Morgan,et al. Differential privacy , 2020, The Science of Quantitative Information Flow.