Practical privacy, Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '05, 2005. ,
DOI : 10.1145/1065167.1065184
A learning theory approach to noninteractive database privacy, Journal of the ACM, vol.60, issue.2, p.12, 2013. ,
DOI : 10.1145/2450142.2450148
Our Data, Ourselves: Privacy Via Distributed Noise Generation, Proceedings of the Conference on Theory and Applications of Cryptographic Techniques (EUROCRPYT), 2006. ,
DOI : 10.1109/SFCS.2000.892063
URL : http://www.wisdom.weizmann.ac.il/~naor/PAPERS/odo.pdf
Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Conference on Theory of Cryptography (TCC), pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
The Algorithmic Foundations of Differential Privacy, Foundations and Trends?? in Theoretical Computer Science, vol.9, issue.3-4, pp.211-407, 2014. ,
DOI : 10.1561/0400000042
RAPPOR, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1145/1806689.1806794
URL : http://arxiv.org/pdf/1407.6981
A density-based algorithm for discovering clusters in large spatial databases with noise, Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), 1996. ,
Private coresets, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536465
Foundations of Cryptography Basic Applications, 2009. ,
Plug-In Privacy for Smart Metering Billing, International Symposium on Privacy Enhancing Technologies Symposium, pp.192-210, 2011. ,
DOI : 10.1007/978-3-642-22263-4_11
Privacy for the protected (only) ArXiv e-prints, 2015. ,
Frequency-Hiding Order-Preserving Encryption, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.656-667, 2015. ,
DOI : 10.1109/ICDE.2006.150
On the practical importance of communication complexity for secure multi-party computation protocols, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, pp.2008-2015, 2009. ,
DOI : 10.1145/1529282.1529730
Outlier Privacy, Proceedings of the Conference on Theory of Cryptography (TCC), 2015. ,
DOI : 10.1007/978-3-662-46497-7_11
Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, 2008. ,
DOI : 10.1109/ICDE.2008.4497436
URL : http://www.cs.cornell.edu/~mvnak/pubs/ICDE08_conference_0768.pdf
Privacy integrated queries: an extensible platform for privacy-preserving data analysis, Proceedings of the ACM International Conference on Management of Data (SIGMOD), 2009. ,
Smooth sensitivity and sampling in private data analysis, Proceedings of the thirty-ninth annual ACM symposium on Theory of computing , STOC '07, 2007. ,
DOI : 10.1145/1250790.1250803
Locating a Small Cluster Privately, Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS '16, 2016. ,
DOI : 10.1145/1993636.1993743
URL : http://arxiv.org/pdf/1604.05590
Relationship privacy, Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, PODS '09, 2009. ,
DOI : 10.1145/1559795.1559812
New Algorithms for Preserving Differential Privacy, 2010. ,
Airavat: Security and privacy for mapreduce, Proceedings of the USENIX Conference on Networked systems design and implementation (NSDI), 2010. ,
Differentially Private K-Means Clustering, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY '16, 2016. ,
DOI : 10.14778/2350229.2350253
URL : http://dl.acm.org/ft_gateway.cfm?id=2857708&type=pdf
Differential Privacy with Bounded Priors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1016/j.jbi.2014.01.008