<--- Back to Details
First PageDocument Content
Data privacy / Applied probability / Exponential mechanism / Time complexity / Differential privacy / Constructible universe / Polynomial / Negligible function / PP / Theoretical computer science / Mathematics / Computational complexity theory
Date: 2010-11-01 14:13:39
Data privacy
Applied probability
Exponential mechanism
Time complexity
Differential privacy
Constructible universe
Polynomial
Negligible function
PP
Theoretical computer science
Mathematics
Computational complexity theory

When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Download Document from Source Website

File Size: 333,15 KB

Share Document on Facebook

Similar Documents

E:/Documents/Courses/Spring 2011/gc/dyn/dyn.dvi

E:/Documents/Courses/Spring 2011/gc/dyn/dyn.dvi

DocID: 1qixK - View Document

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

DocID: 1q00z - View Document

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

DocID: 1lpEN - View Document

When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

DocID: 1aT4Q - View Document

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

DocID: 13g5Z - View Document