References

  1. Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi & Geoffrey Smith (2012): Measuring Information Leakage Using Generalized Gain Functions. In: Proc. of CSF, pp. 265–279, doi:10.1109/CSF.2012.26.
  2. Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis & Catuscia Palamidessi (2012): Geo-Indistinguishability: Differential Privacy for Location-Based Systems. Technical Report. Av. at arXiv:1212.1984.
  3. Gilles Barthe, Boris Köpf, Federico Olmedo & Santiago Zanella Béguelin (2012): Probabilistic Relational Reasoning for Differential Privacy. In: Proc. of POPL. ACM, doi:10.1145/2103656.2103670.
  4. Christelle Braun, Konstantinos Chatzikokolakis & Catuscia Palamidessi (2009): Quantitative Notions of Leakage for One-try Attacks. In: Proc. of MFPS, ENTCS 249. Elsevier, pp. 75–91, doi:10.1016/j.entcs.2009.07.085.
  5. T. Champion, L. De Pascale & P. Juutinen (2008): Theınfty -Wasserstein Distance: Local Solutions and Existence of Optimal Transport Maps. SIAM 40(1), pp. 1–20, doi:10.1137/07069938X.
  6. K. Chatzikokolakis, M. Andres, N. Bordenabe & C. Palamidessi: Broadening the scope of Differential Privacy using metrics. In: Proc. of PETS. To appear.
  7. Konstantinos Chatzikokolakis, Catuscia Palamidessi & Prakash Panangaden (2008): Anonymity Protocols as Noisy Channels. Inf. and Comp. 206(2–4), pp. 378–401, doi:10.1016/j.ic.2007.07.003.
  8. Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman & Sara NavidPour (2011): Proving programs robust. In: Proc. of ESEC-13. ACM, pp. 102–112, doi:10.1145/2025113.2025131.
  9. David Clark, Sebastian Hunt & Pasquale Malacaria (2005): Quantified Interference for a While Language. In: Proc. of QAPL, ENTCS 112. Elsevier, pp. 149–166, doi:10.1016/j.entcs.2004.01.018.
  10. Cynthia Dwork (2006): Differential Privacy. In: Proc. of ICALP, LNCS 4052. Springer, pp. 1–12, doi:10.1007/11787006_1.
  11. Cynthia Dwork, Frank Mcsherry, Kobbi Nissim & Adam Smith (2006): Calibrating noise to sensitivity in private data analysis. In: Proc. of TCC, LNCS 3876. Springer, pp. 265–284, doi:10.1007/11681878_14.
  12. Marco Gaboardi, Andreas Haeberlen, Justin Hsu, Arjun Ravi Narayan & Benjamin C. Pierce (2013): Linear Dependent Types for Differential Privacy. In: Proc. of POPL 2013., doi:10.1145/2429069.2429113.
  13. Ivan Gazeau, Dale Miller & Catuscia Palamidessi (2012): A non-local method for robustness analysis of floating point programs. Technical Report. INRIA. Available at http://hal.inria.fr/hal-00665995.
  14. Ivan Gazeau, Dale Miller & Catuscia Palamidessi (2013): Preserving differential privacy under finite-precision semantics. Technical Report. INRIA. Available at http://hal.inria.fr/hal-00780774.
  15. Shen-Shyang Ho & Shuhua Ruan (2011): Differential privacy for location pattern mining. In: Proc. of SPRINGL. ACM, pp. 17–24, doi:10.1145/2071880.2071884.
  16. IEEE Task P754 (2008): IEEE 754-2008, Standard for Floating-Point Arithmetic. IEEE, pub-IEEE-STD:adr, doi:10.1109/IEEESTD.2008.4610935.
  17. Ashwin Machanavajjhala, Daniel Kifer, John M. Abowd, Johannes Gehrke & Lars Vilhuber (2008): Privacy: Theory meets Practice on the Map. In: Proc. of ICDE. IEEE, pp. 277–286, doi:10.1109/ICDE.2008.4497436.
  18. Pasquale Malacaria (2007): Assessing security threats of looping constructs. In: Proc. of POPL. ACM, pp. 225–235, doi:10.1145/1190216.1190251.
  19. Ilya Mironov (2012): On significance of the least significant bits for differential privacy. In: Proc. of, CCS '12. ACM, New York, NY, USA, pp. 650–661, doi:10.1145/2382196.2382264.
  20. Arvind Narayanan & Vitaly Shmatikov (2009): De-anonymizing Social Networks. In: Proc. of S&P. IEEE, pp. 173–187, doi:10.1109/SP.2009.22.
  21. Walter Rudin (1986): Real and Complex Analysis, 3rd edition. McGraw-Hill.
  22. Geoffrey Smith (2009): On the Foundations of Quantitative Information Flow. In: Proc. of FOSSACS, LNCS 5504. Springer, pp. 288–302, doi:10.1007/978-3-642-00596-1_21.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org