Author:
Patil Shriniwas,Parmar Keyur
Publisher
Springer Nature Singapore
Reference34 articles.
1. Apple’s ‘differential privacy’ is about collecting your data—but not your data, https://www.wired.com/2016/06/apples-differential-privacy-collecting-data/
2. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the SIGSAC conference on Computer & communications security. ACM, Berlin, pp 901–914. https://doi.org/10.1145/2508859.2516735
3. Asoodeh S, Liao J, Calmon FP, Kosut O, Sankar L (2021) Three variants of differential privacy: lossless conversion and applications. J Sel Areas Inf Theory 2(1):208–222. https://doi.org/10.1109/JSAIT.2021.3054692
4. Box D, Hejlsberg A (2007) LINQ: NET language-integrated query. MSDN Developer Centre 89:1–27
5. Clifton C, Anandan B (2013) Challenges and opportunities for security with differential privacy. In: Proceedings of the ICISS: 9th international conference on information systems security, vol 8303. Springer, Kolkata, pp 1–13. https://doi.org/10.1007/978-3-642-45204-8_1