共 22 条
[11]
Bognar M., KUIFJE PROTOTYPE QUA
[12]
Chatzikokolakis Konstantinos, 2013, Privacy Enhancing Technologies.13th International Symposium, PETS 2013. Proceedings: LNCS 7981, P82, DOI 10.1007/978-3-642-39077-7_5
[13]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[15]
Gibbons C.M.J., 2019, FDN PROBABILISTIC PR
[16]
McIver A., 2015, P LICS 2015
[17]
McIver A, 2010, LECT NOTES COMPUT SC, V6199, P223, DOI 10.1007/978-3-642-14162-1_19
[18]
A MATHEMATICAL THEORY OF COMMUNICATION
[J].
BELL SYSTEM TECHNICAL JOURNAL,
1948, 27 (04)
:623-656
[19]
Smith G, 2009, LECT NOTES COMPUT SC, V5504, P288
[20]
Proving Differential Privacy with Shadow Execution
[J].
PROCEEDINGS OF THE 40TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '19),
2019,
:655-669