• SuLQ

  • Referenced in 128 articles [sw11355]
  • Practical privacy: the SuLQ framework. We consider a statistical database in which a trusted administrator ... query responses with the goal of maintaining privacy of individual database entries. In such ... Nissim show that a strong form of privacy can be maintained using a surprisingly small ... ways. First, we modify the privacy analysis to real-valued functions f and arbitrary...
  • PrivateLR

  • Referenced in 90 articles [sw11354]
  • epsilon-differentially private (C. Dwork, Differential Privacy, ICALP...
  • RAPPOR

  • Referenced in 33 articles [sw42193]
  • RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. Randomized Aggregatable Privacy-Preserving Ordinal Response, or RAPPOR ... user client software, anonymously, with strong privacy guarantees. In short, RAPPORs allow the forest ... population of client-side strings with strong privacy guarantees for each client, and without linkability ... describes and motivates RAPPOR, details its differential-privacy and utility guarantees, discusses its practical deployment...
  • Casper*

  • Referenced in 18 articles [sw41703]
  • Query processing for location services without compromising privacy. In this article, we present ... privacy-aware query processing framework, Capser*, in which mobile and stationary users can obtain snapshot ... location information. In particular, we propose a privacy-aware query processor embedded inside a location ... rather than the exact location. Our proposed privacy-aware query processor is completely independent...
  • Sharemind

  • Referenced in 16 articles [sw22617]
  • Sharemind: A framework for fast privacy-preserving computations. Gathering and processing sensitive data ... solution—Sharemind—is a virtual machine for privacy-preserving data processing that relies on share ... malicious participants, it still provides significantly increased privacy preservation when compared to standard centralised databases...
  • JFlow

  • Referenced in 26 articles [sw20595]
  • flow control. A promising technique for protecting privacy and integrity of sensitive data...
  • ELmD

  • Referenced in 14 articles [sw20823]
  • nonce at some desired level of privacy are two-pass or Mac-then-Encrypt constructions ... inherently inefficient but provide full privacy) and online constructions like McOE, sponge-type authenticated encryptions ... fully pipeline implementable. It also provides full privacy when associated data is not repeated. Like...
  • TASTY

  • Referenced in 19 articles [sw09865]
  • automatically generate efficient secure protocols for many privacy-preserving applications where we consider...
  • McOE

  • Referenced in 16 articles [sw20876]
  • Schemes. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
  • MixMatch

  • Referenced in 10 articles [sw41280]
  • help achieve a dramatically better accuracy-privacy trade-off for differential privacy. Finally, we perform...
  • SpaceTwist

  • Referenced in 7 articles [sw41706]
  • SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile ... their locations to the service. Intuitively, location privacy may be obtained at the cost ... performance, subjected to given requirements for location privacy and query accuracy. Existing privacy solutions that ... framework offers very good performance and high privacy, at low communication cost...
  • ADSNARK

  • Referenced in 8 articles [sw22496]
  • ADSNARK: nearly practical and privacy-preserving proofs on authenticated data. We study the problem ... privacy-preserving proofs on authenticated data, where a party receives data from a trusted source ... arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state...
  • ConfiChair

  • Referenced in 7 articles [sw13266]
  • Privacy supporting cloud computing: confichair, a case study. Cloud computing means entrusting data to information ... remote servers, in the “cloud”, raising new privacy and confidentiality concerns. We propose a general ... management. We identify the specific security and privacy risks that existing systems like EasyChair ... management system that offers strong security and privacy guarantees.par In ConfiChair, authors, reviewers...
  • BLINC

  • Referenced in 10 articles [sw30333]
  • current flow collectors provide. These restrictions respect privacy, technological and practical constraints. Second...
  • Pufferfish

  • Referenced in 4 articles [sw12982]
  • Pufferfish, A framework for mathematical privacy definitions. In this article, we introduce ... general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy ... frequently do not have expertise in privacy, to develop rigorous privacy definitions for their data ... also be used to study existing privacy definitions.par We illustrate the benefits with several applications...
  • TaintDroid

  • Referenced in 9 articles [sw26740]
  • information-flow tracking system for realtime privacy monitoring on smartphones. Today’s smartphone operating systems...
  • ELmE

  • Referenced in 5 articles [sw22881]
  • nonce) at some desired level of privacy are two-pass or Mac-then-Encrypt constructions ... inherently inefficient but provide full privacy) and online constructions, e.g., McOE, sponge-type authenticated encryptions ... pipeline implementable. It also provides full privacy when associated data (which includes initial value...
  • RAST

  • Referenced in 8 articles [sw17158]
  • User access is controlled to ensure data privacy, but the collaborative environment underpinning the service...
  • Gazelle

  • Referenced in 5 articles [sw38099]
  • learning raises a natural question about the privacy guarantees that can be provided in such ... input to the server, while guaranteeing the privacy of the server’s neural network...
  • iPrivacy

  • Referenced in 3 articles [sw42190]
  • iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. To achieve ... automatic recommendation of privacy settings for image sharing, a new tool called iPrivacy (image privacy ... burden from users on setting the privacy preferences when they share their images for special ... contributions: 1) massive social images and their privacy settings are leveraged to learn the object...