ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
41
views
23
references
Top references
cited by
24
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,538
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - CRYPTO 2009
Computational Differential Privacy
other
Author(s):
Ilya Mironov
,
Omkant Pandey
,
Omer Reingold
,
Salil Vadhan
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Computational epistasis
Most cited references
23
Record
: found
Abstract
: not found
Book Chapter
: not found
Calibrating Noise to Sensitivity in Private Data Analysis
Cynthia Dwork
,
Frank McSherry
,
Kobbi Nissim
…
(2006)
0
comments
Cited
581
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Privacy
Cynthia Dwork
(2006)
0
comments
Cited
359
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Our Data, Ourselves: Privacy Via Distributed Noise Generation
Cynthia Dwork
,
Krishnaram Kenthapadi
,
Frank McSherry
…
(2006)
0
comments
Cited
208
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 126-142
DOI:
10.1007/978-3-642-03356-8_8
SO-VID:
58ff8b1d-1aa7-46b3-9e44-c0eb988c1777
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Reconstructing RSA Private Keys from Random Key Bits
pp. 18
Public-Key Cryptosystems Resilient to Key Leakage
pp. 317
Batch Binary Edwards
pp. 355
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
pp. 541
Privacy-Enhancing Auctions Using Rational Cryptography
pp. 36
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
pp. 55
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
pp. 108
Randomizable Proofs and Delegatable Anonymous Credentials
pp. 126
Computational Differential Privacy
pp. 143
Probabilistically Checkable Arguments
pp. 177
On the Amortized Complexity of Zero-Knowledge Protocols
pp. 192
Linear Algebra with Sub-linear Zero-Knowledge Arguments
pp. 286
How to Encipher Messages on a Small Domain
pp. 303
How to Hash into Elliptic Curves
pp. 374
Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle
pp. 408
Improving the Security of Quantum Protocols via Commit-and-Open
pp. 445
How Risky Is the Random-Oracle Model?
pp. 577
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem
pp. 595
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
pp. 654
Short and Stateless Signatures from the RSA Assumption
Similar content
2,538
Kerkhoff v Minister of Justice and Constitutionai Development 2011 2 SACR109 (GNP): Intermediary Appointment Reports and a Child's Right to Privacy Versus the Right of an Accused to Access to Information
Authors:
M Bekink
Reviewing the data security and privacy policies of mobile apps for depression
Authors:
Kristen O'Loughlin
,
Martha Neary
,
Elizabeth Adkins
…
Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis
Authors:
Patrick Ah-Fat
,
Michael Huth
See all similar
Cited by
24
Technical Privacy Metrics : A Systematic Survey
Authors:
Isabel Wagner
,
David Eckhoff
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning
Authors:
Quanyan Zhu
,
Tao Zhang
Privacy-Preserving Stream Aggregation with Fault Tolerance
Authors:
T. Chan
,
Elaine Shi
,
Dawn Song
See all cited by