共 19 条
[2]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[3]
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1054-1067
[4]
Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies
[J].
SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA,
2014,
:1447-1458
[5]
Humbert M., 2013, Proc. 2013 ACM SIGSAC Conf. Comput. Commun. Secur, P1141
[6]
Kasiviswanathan Shiva Prasad, 2014, J PRIVACY CONFIDENTI, V6, P1, DOI [DOI 10.29012/JPC.V6I1.634, 10.29012/jpc.v6i1.634, DOI 10.29012/JPC.V6I1.634.URL]
[7]
Kifer D, 2011, P 2011 INT C MANAGEM, P193, DOI DOI 10.1145/1989323.1989345
[8]
Kifer Daniel, 2012, PODS, P77, DOI DOI 10.1145/2213556.2213571
[9]
Li N., 2013, P ACM SIGSAC C COMP, P889
[10]
Mechanism design via differential privacy
[J].
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2007,
:94-103