Geoindistinguishability: differential privacy for location-based systems, Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp.901-914, 2013. ,
Optimal Geo-Indistinguishable Mechanisms for Location Privacy, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1145/2660267.2660345
URL : https://hal.archives-ouvertes.fr/hal-00950479
Broadening the Scope of Differential Privacy Using Metrics, PETS 2013, pp.82-102, 2013. ,
DOI : 10.1007/978-3-642-39077-7_5
URL : https://hal.archives-ouvertes.fr/hal-00767210
Generalized Bisimulation Metrics, CONCUR 2014, pp.32-46, 2014. ,
DOI : 10.1007/978-3-662-44584-6_4
URL : https://hal.archives-ouvertes.fr/hal-01011471
A Predictive Differentially-Private Mechanism for Mobility Traces, PETS 2014, pp.21-41, 2014. ,
DOI : 10.1007/978-3-319-08506-7_2
URL : https://hal.archives-ouvertes.fr/hal-01011260
Private information retrieval, Proceedings of 36th Annual Symposium on Foundations of Computer Science, pp.41-50, 1995. ,
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
URL : http://doi.org/10.3233/jcs-2009-0340
Tor: the second-generation onion router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004. ,
Differential Privacy, Part II, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.9141
Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009. ,
DOI : 10.1145/1536414.1536466
RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006. ,
DOI : 10.1109/JSAC.2005.861395
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.7472
Generalizing data to provide anonymity when disclosing information (abstract) Verifying Generalized Differential Privacy in Concurrent Systems XIII Contents On the Power of, Proceedings of the ACM SIGACT?SIGMOD?SIGART Symposium on Principles of Database Systems, p.188, 1998. ,
Loreti Fencing Programs with Self-Invalidation and Self ,
and Emilio Tuosto Multiparty Session Types Within a Canonical Binary Theory, and Beyond, p.74 ,
Pérez A Type Theory for Robust Failure Handling in Distributed Systems, p.96 ,
András Vörös, and István Majzik A Theory for the Composition of Concurrent Processes, p.175 ,
and Min Zhang Enforcing Availability in Failure-Aware Communicating Systems ,
Ramesh The Challenge of Typed Expressiveness in, p.239 ,
Test Vector Generation from Large Scale MATLAB/Simulink Models ,