35 3.3.1 Context and vocabulary, 35 3.3.2 Previous approaches to the privacy problem . . . . . . . . . . . . . . 36 ,
Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.28-69, 2013. ,
DOI : 10.1145/2508859.2516735
Measuring information leakage using generalized gain functions, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.265-279, 2012. ,
Quantitative Notions of Leakage for One-try Attacks, Proceedings of the 25th Conf. on Mathematical Foundations of Programming Semantics, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Formal Verification of Floating-Point Programs, 18th IEEE Symposium on Computer Arithmetic (ARITH '07), pp.187-194, 2007. ,
DOI : 10.1109/ARITH.2007.20
URL : https://hal.archives-ouvertes.fr/hal-01174892
Probabilistic Anonymity, Proceedings of the 16th International Conference on Concurrency Theory (CONCUR 2005), pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Quantitative Multirun Security under Active Adversaries, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.158-167, 2012. ,
DOI : 10.1109/QEST.2012.31
Asymptotic Information Leakage under One-Try Attacks, Proceedings of the 14th International Conference on the Foundations of Software Science and Computational Structures (FOSSACS'11), pp.396-410, 2011. ,
DOI : 10.1007/978-3-642-19805-2_27
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977. ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/inria-00528590
The $\infty$-Wasserstein Distance: Local Solutions and Existence of Optimal Transport Maps, SIAM Journal on Mathematical Analysis, vol.40, issue.1, pp.1-20, 2008. ,
DOI : 10.1137/07069938X
URL : https://hal.archives-ouvertes.fr/hal-01288953
On the lambert w function, In ADVANCES IN COMPUTATIONAL MATHEMATICS, pp.329-359, 1996. ,
Continuity analysis of programs, POPL, pp.57-70, 2010. ,
Proving programs robust, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, SIGSOFT/FSE '11, pp.102-112, 2011. ,
DOI : 10.1145/2025113.2025131
Quantified Interference for a While Language, Proceedings of the Second Workshop on Quantitative Aspects of Programming LanguagesCPP08] Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels. Information and Computation, pp.149-166, 2004. ,
DOI : 10.1016/j.entcs.2004.01.018
A short introduction to the art of programming. circulated privately, p.83, 1971. ,
Differential Privacy with Imperfect Randomness, Advances in Cryptology?CRYPTO 2012, pp.497-516, 2012. ,
DOI : 10.1007/978-3-642-32009-5_29
Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Third Theory of Cryptography Conference (TCC), pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Differential Privacy, 33rd International Colloquium on Automata, Languages and Programming (ICALP), pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
A firm foundation for private data analysis, Taesu Kim, and Te-Won Lee. On the multivariate Laplace distribution, pp.86-96, 2011. ,
DOI : 10.1145/1866739.1866758
Linear dependent types for differential privacy, Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL), pp.357-370, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00909340
A non-local method for robustness analysis of floating point programs, Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems of Electronic Proceedings in Theoretical Computer Science, pp.63-76 ,
DOI : 10.4204/EPTCS.85.5
URL : https://hal.archives-ouvertes.fr/hal-00665995
Non-local Robustness Analysis via Rewriting Techniques, Electronic Proceedings in Theoretical Computer Science, vol.103, issue.4, 2012. ,
DOI : 10.4204/EPTCS.103.8
URL : http://doi.org/10.4204/eptcs.103.8
Preserving differential privacy under finite-precision semantics, Proceedings 11th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL) of Electronic Proceedings in Theoretical Computer Science, pp.1-18, 2013. ,
DOI : 10.1016/j.tcs.2016.01.015
URL : https://hal.archives-ouvertes.fr/hal-00780774
What every computer scientist should know about floating-point arithmetic, ACM Computing Surveys, vol.23, issue.1, pp.5-47, 1991. ,
Static Analyses of the Precision of Floating-Point Operations, Static Analysis, 8th International Symposium, pp.234-259, 2001. ,
DOI : 10.1007/3-540-47764-0_14
Static Analysis of Finite Precision Computations ,
DOI : 10.1007/978-3-540-24738-8_18
Floating point cordic, p.65, 1993. ,
Anonymity and information hiding in multiagent systems An axiomatic basis for computer programming Differential privacy for location pattern mining, Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL), pp.483-512, 1969. ,
Numerical accuracy and hardware tradeoffs for CORDIC arithmetic for special-purpose processors, IEEE Transactions on Computers, vol.42, issue.7, pp.769-779, 1993. ,
DOI : 10.1109/12.237718
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, p.37, 2007. ,
DOI : 10.1109/ICDE.2007.367856
Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007. ,
On significance of the least significant bits for differential privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12 ,
DOI : 10.1145/2382196.2382264
Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, pp.277-286, 2008. ,
DOI : 10.1109/ICDE.2008.4497436
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1 ,
DOI : 10.1145/1217299.1217302
Symbolic Robustness Analysis, 2009 30th IEEE Real-Time Systems Symposium ,
DOI : 10.1109/RTSS.2009.17
Systematic testing for control applications On Theories with a Combinatorial Definition of Equivalence, MEMOCODE, pp.16-17, 1942. ,
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
Measuring the confinement of probabilistic systems, Theoretical Computer Science, vol.340, issue.1, pp.3-56, 2005. ,
DOI : 10.1016/j.tcs.2005.03.002
From t-Closeness to PRAM and Noise Addition Via Information Theory, Privacy in Statistical Databases, pp.100-112, 2008. ,
DOI : 10.1007/978-3-540-87471-3_9
On the foundations of quantitative information flow [Swe02] Latanya Sweeney. k-anonymity: A model for protecting privacy, Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures, pp.17-288, 1986. ,
The CORDIC trigonometric computing technique, IRE Transactions on Electronic Computers, vol.77, issue.8, pp.330-334, 1959. ,