Sciweavers

3395 search results - page 5 / 679
» Computational Differential Privacy
Sort
View
PSD
2010
Springer
167views Database» more  PSD 2010»
13 years 8 months ago
Does Differential Privacy Protect Terry Gross' Privacy?
The concept of differential privacy was motivated through the example of Terry Gross’ height in Dwork (2006). In this paper, we show that when a procedure based on differential p...
Krishnamurty Muralidhar, Rathindra Sarathy
ACISP
2007
Springer
14 years 1 months ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...
NORDSEC
2009
Springer
14 years 4 months ago
Blunting Differential Attacks on PIN Processing APIs
Riccardo Focardi, Flaminia L. Luccio, Graham Steel
PVLDB
2008
101views more  PVLDB 2008»
13 years 9 months ago
Output perturbation with query relaxation
Given a dataset containing sensitive personal information, a statistical database answers aggregate queries in a manner that preserves individual privacy. We consider the problem ...
Xiaokui Xiao, Yufei Tao
FOCS
2010
IEEE
13 years 7 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum