Publications
Search results for wp3 [Reset Search]
Abstract interpretation of temporal concurrent constraint programs”, Theory and Practice of Logic Programming, vol. 15, p. 312–357, 2015.
, “ Constructing elastic distinguishability metrics for location privacy”, Privacy Enhancing Technologies (PoPETs), vol. 2015, p. 156–170, 2015.
, “ Geo-indistinguishability: A Principled Approach to Location Privacy”, in Distributed Computing and Internet Technology - 11th International Conference, (ICDCIT) 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings, 2015.
, “ On the information leakage of differentially-private mechanisms”, Journal of Computer Security, vol. 23, p. 427–469, 2015.
, “ Location Privacy via Geo-Indistinguishability”, in Theoretical Aspects of Computing - (ICTAC) 2015 - 12th International Colloquium Cali, Colombia, October 29-31, 2015, Proceedings, 2015.
, “ Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges”, in Principles of Security and Trust - 4th International Conference, (POST) 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, (ETAPS) 2015, London, UK, April 11-18, 2015, Proceedings, 2015.
, “ Special issue on quantitative information flow”, Mathematical Structures in Computer Science, vol. 25, p. 203–206, 2015.
, “ Additive and Multiplicative Notions of Leakage, and Their Capacities”, in Proceedings of the IEEE 27th Computer Security Foundations Symposium, (CSF) 2014, Vienna, Austria, 19-22 July, 2014, 2014.
, “ Compositional Methods for Information-Hiding”, Mathematical Structures in Computer Science, 2014.
, “ Compositionality Results for Quantitative Information Flow”, in Proceedings of the 11th International Conference on Quantitative Evaluation of SysTems (QEST 2014), Florence, Italy, 2014.
, “ Formal Techniques for Distributed Objects, Components, and Systems - 34th International Conference (FORTE), vol. 8461. 2014.
, Generalized bisimulation metrics”, in CONCUR - 25th Conference on Concurrency Theory, Rome, Italy, 2014.
, “ Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms”, in Horizons of the Mind. {A} Tribute to Prakash Panangaden - Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday, 2014.
, “ Horizons of the Mind. A Tribute to Prakash Panangaden - Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday, vol. 8464. 2014.
, Information Leakage of Non-Terminating Processes”, in FSTTCS, 2014.
, “ Introducing Probabilities in Controller Strategies”, 3rd International Workshop on Quantitative Aspects in Security Assurance, vol. LNCS. 2014.
, “ , “ Optimal Geo-Indistinguishable Mechanisms for Location Privacy”, in CCS - 21st ACM Conference on Computer and Communications Security, Scottsdale, Arizona, United States, 2014.
, “ A Predictive Differentially-Private Mechanism for Mobility Traces”, in PETS 2014 - 14th Privacy Enhancing Technologies Symposium, Amsterdam, Netherlands, 2014.
, “ Time-Dependent Analysis of Attacks”, in Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings, 2014.
, “ An analysis of trust in anonymity networks in the presence of adaptive attackers”, Mathematical Structures in Computer Science, p. to appear, 2013.
, “ Broadening the Scope of Differential Privacy Using Metrics”, in Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings, 2013.dpmetrics.pdf (764.63 KB)
, “ Broadening the Scope of Differential Privacy Using Metrics”, in The 13th Privacy Enhancing Technologies Symposium, Bloomington, Indiana, United States, 2013.
, ““CONCUR 2013 - Concurrency Theory - 24th International Conference, CONCUR 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings”, Lecture Notes in Computer Science, vol. 8052. 2013.
A differentially private mechanism of optimal utility for a region of priors”, in Proceedings of the 2nd Conference on Principles of Security and Trust (POST), 2013.main.pdf (214.46 KB)
, “