C. Dwork, Differential Privacy, Proc. of ICALP, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, and . Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proc. of TCC, pp.265-284, 2006.
DOI : 10.1007/11681878_14

J. Reed and B. C. Pierce, Distance makes the types grow stronger: a calculus for differential privacy, Proc. of ICFP, pp.157-168, 2010.

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

A. Machanavajjhala, D. Kifer, J. M. Abowd, J. Gehrke, and L. Vilhuber, Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, pp.277-286, 2008.
DOI : 10.1109/ICDE.2008.4497436

S. R. Ganta, S. P. Kasiviswanathan, and . Smith, Composition attacks and auxiliary information in data privacy, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, pp.265-273, 2008.
DOI : 10.1145/1401890.1401926

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utility-maximizing privacy mechanisms, Proc. of STOC, pp.351-360, 2009.

H. Brenner and K. Nissim, Impossibility of differentially private universally optimal mechanisms, Proc. of FOCS, pp.71-80, 2010.

K. Nissim, S. Raskhodnikova, and . Smith, Smooth sensitivity and sampling in private data analysis, Proceedings of the thirty-ninth annual ACM symposium on Theory of computing , STOC '07, pp.75-84, 2007.
DOI : 10.1145/1250790.1250803

G. Barthe, B. Köpf, F. Olmedo, and S. Z. Béguelin, Probabilistic relational reasoning for differential privacy, Proc. of POPL, 2012.

C. Dwork, M. Hardt, T. Pitassi, O. Reingold, and R. S. Zemel, Fairness through awareness, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12, pp.214-226, 2012.
DOI : 10.1145/2090236.2090255

K. Chatzikokolakis, . Andrés, E. Miguel, . Bordenabe, E. Nicolás et al., Broadening the Scope of Differential Privacy Using Metrics
DOI : 10.1007/978-3-642-39077-7_5

URL : https://hal.archives-ouvertes.fr/hal-00767210

C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, Our Data, Ourselves: Privacy Via Distributed Noise Generation, Proc. of EUROCRYPT, pp.486-503, 2006.
DOI : 10.1007/11761679_29

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007.
DOI : 10.1109/FOCS.2007.66

H. Lam, G. Fung, and W. Lee, A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof, IEEE Transactions on Consumer Electronics, vol.53, issue.2, pp.653-660, 2007.
DOI : 10.1109/TCE.2007.381742

U. Greveler, B. Justus, and D. Loehr, Multimedia content identification through smart meter power use profiles, In: CPDP, 2012.

G. Danezis, M. Kohlweiss, and A. Rial, Differentially Private Billing with Rebates, IACR Cryptology ePrint Archive, pp.2011-134, 2011.
DOI : 10.1007/978-3-642-24178-9_11

M. Andrés, N. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 1212.
DOI : 10.1145/2508859.2516735

R. Shokri, G. Theodorakopoulos, J. Y. Boudec, and J. P. Hubaux, Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011.
DOI : 10.1109/SP.2011.18

URL : https://hal.archives-ouvertes.fr/hal-01266229

R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Boudec, Protecting location privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.617-627, 2012.
DOI : 10.1145/2382196.2382261