Calibrating noise to sensitivity in private data analysis, Proc. of TCC, ser. LNCS, vol.3876, pp.265-284, 2006. ,
DOI : 10.29012/jpc.v7i3.405
URL : https://journalprivacyconfidentiality.org/index.php/jpc/article/download/405/388
Local privacy and statistical minimax rates, Proc. of FOCS, pp.429-438, 2013. ,
DOI : 10.1109/allerton.2013.6736718
Broadening the scope of Differential Privacy using metrics, Proc. of PETS, ser. LNCS, vol.7981, pp.82-102, 2013. ,
DOI : 10.1007/978-3-642-39077-7_5
URL : https://hal.archives-ouvertes.fr/hal-00767210
An information-theoretic model for adaptive side-channel attacks, Proc. of CCS, pp.286-296, 2007. ,
On the foundations of quantitative information flow, Proc. of FOSSACS, ser. LNCS, vol.5504, pp.288-302, 2009. ,
Measuring information leakage using generalized gain functions, Proc. of CSF, pp.265-279, 2012. ,
DOI : 10.1109/csf.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Abstract channels and their robust information-leakage ordering, Proc. of POST, ser. LNCS, vol.8414, pp.83-102, 2014. ,
Pufferfish: A framework for mathematical privacy definitions, ACM Trans. on Database Systems, vol.39, issue.1, pp.1-3, 2014. ,
Axioms for information leakage, Proc. of CSF, pp.77-92, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01330414
Quantitative information flow -verification hardness and possibilities, Proc. of CSF, pp.15-27, 2010. ,
Algebraic foundations for quantitative information flow, Mathematical Structures in Computer Science, vol.25, issue.2, pp.404-428, 2015. ,
Quantitative information flow, relations and polymorphic types, J. of Logic and Computation, vol.18, issue.2, pp.181-199, 2005. ,
Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007. ,
A lattice of information, Proc. Computer Security Foundations Workshop VI, pp.65-70, 1993. ,
Differential privacy: An economic method for choosing epsilon, Proc. of CSF, pp.398-410, 2014. ,
Selling privacy at auction, Proceedings of the 12th ACM Conf. on Electronic Commerce, ser. EC '11, pp.199-208, 2011. ,
Geo-indistinguishability: differential privacy for location-based systems, Proc. of CCS, pp.901-914, 2013. ,
Information-theoretic bounds for differentially private mechanisms, Proc. of CSF. IEEE, pp.191-204, 2011. ,
On the 'semantics' of differential privacy: A bayesian formulation, Journal of Privacy and Confidentiality, vol.6, 2008. ,
On the hardness of computing intersection, union and minkowski sum of polytopes, Discrete & Computational Geometry, vol.40, issue.3, pp.469-479, 2008. ,
Extended convex hull, Comput. Geom, vol.20, pp.13-23, 2000. ,
, Convex optimization theory, 2009.