Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi & Geoffrey Smith (2012):
Measuring Information Leakage Using Generalized Gain Functions.
In: Proc. of CSF,
pp. 265–279,
doi:10.1109/CSF.2012.26.
Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis & Catuscia Palamidessi (2012):
Geo-Indistinguishability: Differential Privacy for Location-Based Systems.
Technical Report.
Av. at arXiv:1212.1984.
Gilles Barthe, Boris Köpf, Federico Olmedo & Santiago Zanella Béguelin (2012):
Probabilistic Relational Reasoning for Differential Privacy.
In: Proc. of POPL.
ACM,
doi:10.1145/2103656.2103670.
Christelle Braun, Konstantinos Chatzikokolakis & Catuscia Palamidessi (2009):
Quantitative Notions of Leakage for One-try Attacks.
In: Proc. of MFPS,
ENTCS 249.
Elsevier,
pp. 75–91,
doi:10.1016/j.entcs.2009.07.085.
T. Champion, L. De Pascale & P. Juutinen (2008):
Theınfty -Wasserstein Distance: Local Solutions and Existence of Optimal Transport Maps.
SIAM 40(1),
pp. 1–20,
doi:10.1137/07069938X.
K. Chatzikokolakis, M. Andres, N. Bordenabe & C. Palamidessi:
Broadening the scope of Differential Privacy using metrics.
In: Proc. of PETS. To appear.
Konstantinos Chatzikokolakis, Catuscia Palamidessi & Prakash Panangaden (2008):
Anonymity Protocols as Noisy Channels.
Inf. and Comp. 206(2–4),
pp. 378–401,
doi:10.1016/j.ic.2007.07.003.
Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman & Sara NavidPour (2011):
Proving programs robust.
In: Proc. of ESEC-13.
ACM,
pp. 102–112,
doi:10.1145/2025113.2025131.
David Clark, Sebastian Hunt & Pasquale Malacaria (2005):
Quantified Interference for a While Language.
In: Proc. of QAPL,
ENTCS 112.
Elsevier,
pp. 149–166,
doi:10.1016/j.entcs.2004.01.018.
Cynthia Dwork (2006):
Differential Privacy.
In: Proc. of ICALP,
LNCS 4052.
Springer,
pp. 1–12,
doi:10.1007/11787006_1.
Cynthia Dwork, Frank Mcsherry, Kobbi Nissim & Adam Smith (2006):
Calibrating noise to sensitivity in private data analysis.
In: Proc. of TCC,
LNCS 3876.
Springer,
pp. 265–284,
doi:10.1007/11681878_14.
Marco Gaboardi, Andreas Haeberlen, Justin Hsu, Arjun Ravi Narayan & Benjamin C. Pierce (2013):
Linear Dependent Types for Differential Privacy.
In: Proc. of POPL 2013.,
doi:10.1145/2429069.2429113.
Ivan Gazeau, Dale Miller & Catuscia Palamidessi (2012):
A non-local method for robustness analysis of floating point programs.
Technical Report.
INRIA.
Available at http://hal.inria.fr/hal-00665995.
Ivan Gazeau, Dale Miller & Catuscia Palamidessi (2013):
Preserving differential privacy under finite-precision semantics.
Technical Report.
INRIA.
Available at http://hal.inria.fr/hal-00780774.
Shen-Shyang Ho & Shuhua Ruan (2011):
Differential privacy for location pattern mining.
In: Proc. of SPRINGL.
ACM,
pp. 17–24,
doi:10.1145/2071880.2071884.
IEEE Task P754 (2008):
IEEE 754-2008, Standard for Floating-Point Arithmetic.
IEEE,
pub-IEEE-STD:adr,
doi:10.1109/IEEESTD.2008.4610935.
Ashwin Machanavajjhala, Daniel Kifer, John M. Abowd, Johannes Gehrke & Lars Vilhuber (2008):
Privacy: Theory meets Practice on the Map.
In: Proc. of ICDE.
IEEE,
pp. 277–286,
doi:10.1109/ICDE.2008.4497436.
Pasquale Malacaria (2007):
Assessing security threats of looping constructs.
In: Proc. of POPL.
ACM,
pp. 225–235,
doi:10.1145/1190216.1190251.
Ilya Mironov (2012):
On significance of the least significant bits for differential privacy.
In: Proc. of,
CCS '12.
ACM,
New York, NY, USA,
pp. 650–661,
doi:10.1145/2382196.2382264.
Arvind Narayanan & Vitaly Shmatikov (2009):
De-anonymizing Social Networks.
In: Proc. of S&P.
IEEE,
pp. 173–187,
doi:10.1109/SP.2009.22.
Walter Rudin (1986):
Real and Complex Analysis,
3rd edition.
McGraw-Hill.
Geoffrey Smith (2009):
On the Foundations of Quantitative Information Flow.
In: Proc. of FOSSACS,
LNCS 5504.
Springer,
pp. 288–302,
doi:10.1007/978-3-642-00596-1_21.