Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
On anonymizing query logs via token-based hashing
Proceedings of the 16th international conference on World Wide Web
The price of privacy and the limits of LP decoding
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Mechanism Design via Differential Privacy
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
A learning theory approach to non-interactive database privacy
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
On the complexity of differentially private data release: efficient algorithms and hardness results
Proceedings of the forty-first annual ACM symposium on Theory of computing
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Computational Differential Privacy
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
On the geometry of differential privacy
Proceedings of the forty-second ACM symposium on Theory of computing
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM
Differential privacy under continual observation
Proceedings of the forty-second ACM symposium on Theory of computing
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Differential privacy in new settings
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Private and continual release of statistics
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Boosting the accuracy of differentially private histograms through consistency
Proceedings of the VLDB Endowment
PCPs and the hardness of generating private synthetic data
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data
Transactions on Data Privacy
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
On the relation between differential privacy and quantitative information flow
ICALP'11 Proceedings of the 38th international conference on Automata, languages and programming - Volume Part II
Quantitative information flow and applications to differential privacy
Foundations of security analysis and design VI
The effect of homogeneity on the complexity of k-anonymity
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
Communications of the ACM
Private and Continual Release of Statistics
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Differential privacy for location pattern mining
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Probabilistic relational reasoning for differential privacy
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
An adaptive mechanism for accurate query answering under differential privacy
Proceedings of the VLDB Endowment
ACM SIGCOMM Computer Communication Review
A Practical Differentially Private Random Decision Tree Classifier
Transactions on Data Privacy
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
On the complexity of aggregating information for authentication and profiling
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
Differentially private transit data publication: a case study on the montreal transportation system
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially private continual monitoring of heavy hitters from distributed streams
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Differential privacy: on the trade-off between utility and information leakage
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Min-Entropy leakage of channels in cascade
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
On significance of the least significant bits for differential privacy
Proceedings of the 2012 ACM conference on Computer and communications security
Optimal lower bound for differentially private multi-party aggregation
ESA'12 Proceedings of the 20th Annual European conference on Algorithms
Security of random output perturbation for statistical databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Characterizing the sample complexity of private learners
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
A theory of pricing private data
Proceedings of the 16th International Conference on Database Theory
A differentially private mechanism of optimal utility for a region of priors
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
On Learning Cluster Coefficient of Private Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
A privacy framework: indistinguishable privacy
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Secure multiparty aggregation with differential privacy: a comparative study
Proceedings of the Joint EDBT/ICDT 2013 Workshops
The power of data use management in action
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Practical differential privacy via grouping and smoothing
Proceedings of the VLDB Endowment
Probabilistic Relational Reasoning for Differential Privacy
ACM Transactions on Programming Languages and Systems (TOPLAS)
Differential privacy for neighborhood-based collaborative filtering
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Geo-indistinguishability: differential privacy for location-based systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
Journal of Computer Security
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 48.27 |
What does it mean to preserve privacy?