Computational Differential Privacy
暂无分享,去创建一个
Omer Reingold | Ilya Mironov | Salil P. Vadhan | Omkant Pandey | S. Vadhan | Ilya Mironov | O. Reingold | Omkant Pandey | Omer Reingold
[1] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[2] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[3] Shafi Goldwasser,et al. Private coins versus public coins in interactive proof systems , 1986, STOC '86.
[4] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[5] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[6] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[7] Rafail Ostrovsky,et al. Efficient search for approximate nearest neighbor in high dimensional spaces , 1998, STOC '98.
[8] Joan Feigenbaum,et al. Secure Multiparty Computation of Approximations , 2001, ICALP.
[9] Avi Wigderson,et al. Computational Analogues of Entropy , 2003, RANDOM-APPROX.
[10] Rafael Pass,et al. Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition , 2003, EUROCRYPT.
[11] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[12] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[13] Amit Sahai,et al. New notions of security: achieving universal composability without trusted setup , 2004, STOC '04.
[14] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[15] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[16] T. Tao,et al. The primes contain arbitrarily long arithmetic progressions , 2004, math/0404188.
[17] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[18] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[19] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[20] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[21] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[22] Choonsik Park,et al. Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers , 2005, ICISC.
[23] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[24] T. Tao,et al. The primes contain arbitrarily long polynomial progressions , 2006, math/0610050.
[25] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[26] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[27] Silvio Micali,et al. Input-Indistinguishable Computation , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[28] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[29] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[30] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[31] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[32] Madhur Tulsiani,et al. Dense Subsets of Pseudorandom Sets , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[33] A. Blum,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[34] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[35] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[36] Eran Omri,et al. Distributed Private Data Analysis: On Simultaneously Solving How and What , 2008, CRYPTO.
[37] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[38] Haim Kaplan,et al. Private coresets , 2009, STOC '09.
[39] Jan Camenisch,et al. Private Intersection of Certified Sets , 2009, Financial Cryptography.
[40] Keith B. Frikken. Secure multiparty computation , 2010 .
[41] Frank McSherry. Privacy integrated queries , 2009, Commun. ACM.
[42] Kannan Balasubramanian,et al. Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.