The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975. ,
DOI : 10.1002/j.1538-7305.1975.tb02040.x
Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978. ,
DOI : 10.1109/TIT.1978.1055892
On the design and quantification of privacy preserving data mining algorithms, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001. ,
DOI : 10.1145/375551.375602
Secure Communication Over Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2470-2492, 2008. ,
DOI : 10.1109/TIT.2008.921678
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003. ,
DOI : 10.1145/1066116.1189037
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.675-683, 2009. ,
DOI : 10.1109/INFCOM.2009.5061975
Security-control methods for statistical databases: a comparative study, ACM Computing Surveys, vol.21, issue.4, pp.515-556, 1989. ,
DOI : 10.1145/76894.76895
Finding a needle in a haystack -or identifying anonymous census records, Jour. Off. Stats, vol.2, issue.3, pp.329-336, 1986. ,
Assessing the Risk of Disclosure of Confidential Categorical Data, pp.125-144, 2000. ,
Differential Privacy, Proc. 33rd Intl. Colloq. Automata, Lang., Prog, 2006. ,
DOI : 10.1007/11787006_1
A theory of privacy and utility in databases, " under revision, IEEE Trans. Inform. Forensics and Security ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.6, pp.918-923, 1983. ,
DOI : 10.1109/TIT.1983.1056749
Calibrating Noise to Sensitivity in Private Data Analysis, Proc. 3rd IACR Theory Crypto. Conf, 2006. ,
DOI : 10.1007/11681878_14
Data security and protection: Information sharing across private databases, Proc. ACM Intl. Conf. Management Data, pp.86-97, 2003. ,
DOI : 10.1145/872757.872771
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.3600
Competitive Privacy: Secure Analysis on Integrated Sequence Data, Proc. Database Syst, pp.168-175, 2010. ,
DOI : 10.1007/978-3-642-12098-5_13
Competitive privacy in the smart grid: An information-theoretic approach, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2011. ,
DOI : 10.1109/SmartGridComm.2011.6102322
Pricing mechanisms for cooperative state estimation, 2012 5th International Symposium on Communications, Control and Signal Processing, pp.1-4, 2012. ,
DOI : 10.1109/ISCCSP.2012.6217856
URL : https://hal.archives-ouvertes.fr/hal-00771239
On Cross-Enterprise Collaboration, Business Process Management, pp.29-37, 2011. ,
DOI : 10.1016/j.emj.2008.04.003
Repeated games for privacy-aware distributed state estimation in the smart grid, Intl. Conf. on Network Games, 2012. ,
Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures, 2010 First IEEE International Conference on Smart Grid Communications, pp.232-237, 2010. ,
DOI : 10.1109/SMARTGRID.2010.5622047
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011. ,
DOI : 10.1109/ICASSP.2011.5946886
Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, pp.735-746, 2010. ,
DOI : 10.1145/1807167.1807247
Smart Meter Privacy: A Theoretical Framework, IEEE Transactions on Smart Grid, vol.4, issue.2, pp.1-10, 2012. ,
DOI : 10.1109/TSG.2012.2211046
Privacy???Security Trade-Offs in Biometric Security Systems???Part I: Single Use Case, IEEE Transactions on Information Forensics and Security, vol.6, issue.1, pp.122-139, 2011. ,
DOI : 10.1109/TIFS.2010.2098872
FBI launches $1 billion face recognition project, NewScientist, 2012. ,
Privacy-Preserving Face Recognition, LNCS, vol.5672, pp.235-253, 2007. ,
DOI : 10.1007/978-3-642-03168-7_14
Private media search on public databases ,
Rate-efficient visual correspondences using random projections, Proc. IEEE Intl. Conf. on Image Processing, pp.217-220, 2008. ,