共 18 条
- [1] ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
- [2] Barak Boaz, 2007, P 26 ACM SIGMOD SIGA, P273, DOI [DOI 10.1145/1265530.1265569, 10.1145/1265530.1265569]
- [3] BARBARO M, 2006, NY TIMES 0809
- [4] Blum Avrim, 2005, P 24 ACM SIGMOD SIGA, P128, DOI [DOI 10.1145/1065167.1065184, 10.1145/1065167.1065184]
- [5] Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
- [6] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
- [7] Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
- [8] Calibrating noise to sensitivity in private data analysis [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
- [9] Ganta S.R., 2008, P 14 ACM SIGKDD INT, P265, DOI [DOI 10.1145/1401890.1401926, 10.1145/1401890.1401926]
- [10] Isard M., 2007, Operating Systems Review, V41, P59, DOI 10.1145/1272998.1273005