Information Security
暂无分享,去创建一个
[1] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Yong Yu,et al. Cloud computing security and privacy: Standards and regulations , 2017, Comput. Stand. Interfaces.
[3] Xiaohua Jia,et al. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.
[4] E. L. Lehmann,et al. Theory of point estimation , 1950 .
[5] Peter G. M. van der Heijden,et al. Meta-Analysis of Randomized Response Research , 2005 .
[6] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[7] Sherman S. M. Chow,et al. Security Mediated Certificateless Signatures , 2007, ACNS.
[8] Peter Kairouz,et al. Discrete Distribution Estimation under Local Privacy , 2016, ICML.
[9] Úlfar Erlingsson,et al. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries , 2015, Proc. Priv. Enhancing Technol..
[10] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[11] Jacques Stern,et al. A new paradigm for public key identification , 1996, IEEE Trans. Inf. Theory.
[12] D. Horvitz,et al. A Multi-Proportions Randomized Response Model , 1967 .
[13] Byoungcheon Lee,et al. Multiplicative Homomorphic E-Voting , 2004, INDOCRYPT.
[14] Patrick D. Bourke. Randomized response multivariate designs for categorical data , 1982 .
[15] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[16] W. R. Simmons,et al. The Unrelated Question Randomized Response Model: Theoretical Framework , 1969 .
[17] Kosuke Imai,et al. Design and Analysis of the Randomized Response Technique , 2015 .
[18] Jun Tang,et al. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 , 2017, ArXiv.
[19] S. Franceschi,et al. A randomized response procedure for multiple-sensitive questions , 2012 .
[20] Robert A. Peterson,et al. A Critical Evaluation of the Randomized Response Method , 1991 .
[21] P. Moran,et al. Random division of an interval , 1951, Mathematical Proceedings of the Cambridge Philosophical Society.
[22] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[23] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[24] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[25] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[26] G. Casella,et al. Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.
[27] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[28] Peter Sanders. Algorithm Engineering , 2010, Informatik-Spektrum.
[29] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[30] Pramod Viswanath,et al. Extremal Mechanisms for Local Differential Privacy , 2014, J. Mach. Learn. Res..
[31] Bernard G. Greenberg,et al. The Two Alternate Questions Randomized Response Model for Human Surveys , 1973 .