Frequency of Elements in Sanitized Streams and t-Incidence Estimation from Differentially Pan-Private Bloom Filters. Under submission, 2016. ,
BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters, Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS12), 2012. ,
DOI : 10.1007/978-3-642-33536-5_20
URL : https://hal.archives-ouvertes.fr/hal-00724829
Sanitization of Call Detail Records via Differentially-Private Bloom Filters, Data and Applications Security and Privacy XXIX -29th Annual IFIP WG 11.3 Working Conference Proceedings, volume 9149 of Lecture Notes in Computer Science, pp.223-230, 2015. ,
DOI : 10.1007/978-3-319-20810-7_15
URL : https://hal.archives-ouvertes.fr/hal-01244580
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10) Downloaded from http, 2013. ,
Space/Time Trade-offs in Hash Coding with Allowable Errors, Commun. ACM, vol.13, issue.7, pp.422-426, 1970. ,
Multilevel adaptive hashing, Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, pp.22-24, 1990. ,
How tracking customers in-store will soon be the norm, 2014. ,
Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, WPA '14, 2014. ,
DOI : 10.1145/2611264.2611266
URL : https://hal.archives-ouvertes.fr/hal-00983363
Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06), Part II, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
On the Difficulties of Disclosure Prevention in Statistical Databases or the Case for Differential Privacy, Journal of Privacy and Confidentiality, vol.2, issue.1, p.8, 2008. ,
Pan- Private Streaming Algorithms, Proceedings of the 1st Symposium on Innovations in Computer Science (ICS'10), pp.66-80, 2010. ,
No, this isn't a scene from minority report. This trash can is stalking you. Ars Technica, 2013. ,
Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007. ,
Privacy-Preserving Mobility Monitoring Using Sketches of Stationary Sensor Readings, Machine Learning and Knowledge Discovery in Databases -European Conference, ECML PKDD 2013 Proceedings, Part III, pp.370-386, 2013. ,
DOI : 10.1007/978-3-642-40994-3_24
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294, 2012. ,
DOI : 10.1145/2426656.2426685
Mobile Location Analytics Code of Conduct, 2013. ,
My phone at your service. Federal Trade Commission, 2014. ,