1. Dakshi Agrawal and Dogan Kesdogan . 2003. Measuring anonymity: The disclosure attack . IEEE Security & privacy 1, 6 ( 2003 ), 27–34. Dakshi Agrawal and Dogan Kesdogan. 2003. Measuring anonymity: The disclosure attack. IEEE Security & privacy 1, 6 (2003), 27–34.
2. Sebastian Angel , Hitesh Ballani , Thomas Karagiannis , Greg O’Shea , and Eno Thereska . 2014. End-to-end performance isolation through virtual datacenters . In 11th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 14). 233–248. Sebastian Angel, Hitesh Ballani, Thomas Karagiannis, Greg O’Shea, and Eno Thereska. 2014. End-to-end performance isolation through virtual datacenters. In 11th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 14). 233–248.
3. Sebastian Angel , Sampath Kannan , and Zachary Ratliff . 2020 . Private resource allocators and their applications . In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 372–391 . Sebastian Angel, Sampath Kannan, and Zachary Ratliff. 2020. Private resource allocators and their applications. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 372–391.
4. What's a Little Leakage Between Friends?
5. Borja Balle , Gilles Barthe , and Marco Gaboardi . 2018. Privacy amplification by subsampling: Tight analyses via couplings and divergences. Advances in Neural Information Processing Systems 31 ( 2018 ). Borja Balle, Gilles Barthe, and Marco Gaboardi. 2018. Privacy amplification by subsampling: Tight analyses via couplings and divergences. Advances in Neural Information Processing Systems 31 (2018).