A. Blum, C. Dwork, F. Mcsherry, and K. Nissim, Practical privacy, Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '05, 2005.
DOI : 10.1145/1065167.1065184

A. Blum, K. Ligett, and A. Roth, A learning theory approach to noninteractive database privacy, Journal of the ACM, vol.60, issue.2, p.12, 2013.
DOI : 10.1145/2450142.2450148

C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, Our Data, Ourselves: Privacy Via Distributed Noise Generation, Proceedings of the Conference on Theory and Applications of Cryptographic Techniques (EUROCRPYT), 2006.
DOI : 10.1109/SFCS.2000.892063

URL : http://www.wisdom.weizmann.ac.il/~naor/PAPERS/odo.pdf

C. Dwork, F. Mcsherry, K. Nissim, and . Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Conference on Theory of Cryptography (TCC), pp.265-284, 2006.
DOI : 10.1007/11681878_14

C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, Foundations and Trends?? in Theoretical Computer Science, vol.9, issue.3-4, pp.211-407, 2014.
DOI : 10.1561/0400000042

´. U. Erlingsson, V. Pihur, and A. Korolova, RAPPOR, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1145/1806689.1806794

URL : http://arxiv.org/pdf/1407.6981

M. Ester, H. P. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), 1996.

D. Feldman, A. Fiat, H. Kaplan, and K. Nissim, Private coresets, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009.
DOI : 10.1145/1536414.1536465

O. Goldreich, Foundations of Cryptography Basic Applications, 2009.

M. Jawurek, M. Johns, and F. Kerschbaum, Plug-In Privacy for Smart Metering Billing, International Symposium on Privacy Enhancing Technologies Symposium, pp.192-210, 2011.
DOI : 10.1007/978-3-642-22263-4_11

M. Kearns, A. Roth, Z. S. Wu, and G. Yaroslavtsev, Privacy for the protected (only) ArXiv e-prints, 2015.

F. Kerschbaum, Frequency-Hiding Order-Preserving Encryption, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.656-667, 2015.
DOI : 10.1109/ICDE.2006.150

F. Kerschbaum, D. Dahlmeier, A. Schröpfer, and D. Biswas, On the practical importance of communication complexity for secure multi-party computation protocols, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, pp.2008-2015, 2009.
DOI : 10.1145/1529282.1529730

E. Lui and R. Pass, Outlier Privacy, Proceedings of the Conference on Theory of Cryptography (TCC), 2015.
DOI : 10.1007/978-3-662-46497-7_11

A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber, Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, 2008.
DOI : 10.1109/ICDE.2008.4497436

URL : http://www.cs.cornell.edu/~mvnak/pubs/ICDE08_conference_0768.pdf

F. Mcsherry, Privacy integrated queries: an extensible platform for privacy-preserving data analysis, Proceedings of the ACM International Conference on Management of Data (SIGMOD), 2009.

K. Nissim, S. Raskhodnikova, and . Smith, Smooth sensitivity and sampling in private data analysis, Proceedings of the thirty-ninth annual ACM symposium on Theory of computing , STOC '07, 2007.
DOI : 10.1145/1250790.1250803

K. Nissim, U. Stemmer, and S. Vadhan, Locating a Small Cluster Privately, Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS '16, 2016.
DOI : 10.1145/1993636.1993743

URL : http://arxiv.org/pdf/1604.05590

V. Rastogi, M. Hay, G. Miklau, and D. Suciu, Relationship privacy, Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, PODS '09, 2009.
DOI : 10.1145/1559795.1559812

A. Roth, New Algorithms for Preserving Differential Privacy, 2010.

I. Roy, S. T. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, Airavat: Security and privacy for mapreduce, Proceedings of the USENIX Conference on Networked systems design and implementation (NSDI), 2010.

D. Su, J. Cao, N. Li, E. Bertino, and H. Jin, Differentially Private K-Means Clustering, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY '16, 2016.
DOI : 10.14778/2350229.2350253

URL : http://dl.acm.org/ft_gateway.cfm?id=2857708&type=pdf

F. Tramèr, Z. Huang, J. P. Hubaux, and E. Ayday, Differential Privacy with Bounded Priors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1016/j.jbi.2014.01.008