M. Alaggan, S. Gambs, and A. Kermarrec, BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters, Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS12), 2012.
DOI : 10.1007/978-3-642-33536-5_20

URL : https://hal.archives-ouvertes.fr/hal-00724829

M. Alaggan, S. Gambs, S. Matwin, and M. Tuhin, Sanitization of Call Detail Records via Differentially-Private Bloom Filters, Data and Applications Security and Privacy XXIX -29th Annual IFIP WG 11.3 Working Conference Proceedings, volume 9149 of Lecture Notes in Computer Science, pp.223-230, 2015.
DOI : 10.1007/978-3-319-20810-7_15

URL : https://hal.archives-ouvertes.fr/hal-01244580

S. Coles, An Introduction to Statistical Modeling of Extreme Values, 2001.
DOI : 10.1007/978-1-4471-3675-0

G. Cormode and M. Hadjieleftheriou, Finding the frequent items in streams of data, Communications of the ACM, vol.52, issue.10, pp.97-105, 2009.
DOI : 10.1145/1562764.1562789

M. Datar and S. Muthukrishnan, Estimating Rarity and Similarity over Data Stream Windows, Proceedings of the 10th Annual European Symposium on Algorithms (ESA'02), volume 2461 of Lecture Notes in Computer Science, pp.323-334, 2002.
DOI : 10.1007/3-540-45749-6_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.6453

C. Dwork, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming Part II, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin, Pan-Private Streaming Algorithms, Proceedings of the 1st Symposium on Innovations in Computer Science (ICS'10), pp.66-80, 2010.

R. L. Graham, D. E. Knuth, and O. Patashnik, Concrete Mathematics: A Foundation for Computer Science, Computers in Physics, vol.3, issue.5, 1994.
DOI : 10.1063/1.4822863

A. Mcgregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar et al., The Limits of Two-Party Differential Privacy, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, p.106, 2011.
DOI : 10.1109/FOCS.2010.14

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007.
DOI : 10.1109/FOCS.2007.66

D. J. Mir, S. Muthukrishnan, A. Nikolov, and R. N. Wright, Pan-private algorithms via statistics on sketches, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, pp.37-48, 2011.
DOI : 10.1145/1989284.1989290

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.348.5052

A. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294, 2012.
DOI : 10.1145/2426656.2426685

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.2431

R. P. Stanley, Enumerative Combinatorics, 2011.