Measuring risk and utility of anonymized data using information theory, Proceedings of the 2009 EDBT/ICDT Workshops on, EDBT/ICDT '09, pp.126-130, 2009. ,
DOI : 10.1145/1698790.1698811
Differential Privacy: A Survey of Results, Theory and Applications of Models of Computation, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Estimating mutual information, Physical Review E, vol.140, issue.6, p.66138, 2004. ,
DOI : 10.1103/PhysRevE.62.3096
t-closeness: Privacy beyond ?-anonymity and ?diversity, Proc. of IEEE 23rd International Conference on Data Engineering (ICDE'07, 2007. ,
DOI : 10.1109/icde.2007.367856
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases, Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science Proceedings, pp.251-266, 2016. ,
DOI : 10.1145/1540276.1540279
URL : https://hal.archives-ouvertes.fr/hal-01635002
Estimation of R\'enyi Entropy and Mutual Information Based on Generalized Nearest-Neighbor Graphs. ArXiv e-prints, 2010. ,
Estimation of rényi entropy and mutual information based on generalized nearest-neighbor graphs ,
An efficient and secure data sharing framework using homomorphic encryption in the cloud, Proceedings of the 1st International Workshop on Cloud Intelligence, Cloud-I '12, pp.1-8, 2012. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption, IEEE Transactions on Cloud Computing, issue.99, pp.1-1, 2016. ,
DOI : 10.1109/TCC.2016.2545668