共 27 条
- [1] Bellare M., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P292
- [3] Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (01): : 1045 - 1056
- [4] Differentially Private Spatial Decompositions [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 20 - 31
- [5] Differential privacy: A survey of results [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 : 1 - 19
- [7] Furukawa Jun, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P129, DOI 10.1007/978-3-642-40203-6_8
- [8] Furukawa J, 2014, LECT NOTES COMPUT SC, V8813, P337, DOI 10.1007/978-3-319-12280-9_22
- [9] Ganta S.R., 2008, P 14 ACM SIGKDD INT, P265, DOI [DOI 10.1145/1401890.1401926, 10.1145/1401890.1401926]
- [10] Introduction and Preliminaries [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2005, 1 (01): : 1 - 124