A. D. Wyner, The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

I. Csiszar and J. Korner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/TIT.1978.1055892

D. Agrawal and C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001.
DOI : 10.1145/375551.375602

Y. Liang, V. Poor, and S. Shamai, Secure Communication Over Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2470-2492, 2008.
DOI : 10.1109/TIT.2008.921678

M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

M. Reiter and A. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

S. Liu, Y. Chen, W. Trappe, and L. Greenstein, ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.675-683, 2009.
DOI : 10.1109/INFCOM.2009.5061975

N. R. Adam and J. C. Wortmann, Security-control methods for statistical databases: a comparative study, ACM Computing Surveys, vol.21, issue.4, pp.515-556, 1989.
DOI : 10.1145/76894.76895

T. Dalenius, Finding a needle in a haystack -or identifying anonymous census records, Jour. Off. Stats, vol.2, issue.3, pp.329-336, 1986.

A. Dobra, S. Fienberg, and M. Trottini, Assessing the Risk of Disclosure of Confidential Categorical Data, pp.125-144, 2000.

C. Dwork, Differential Privacy, Proc. 33rd Intl. Colloq. Automata, Lang., Prog, 2006.
DOI : 10.1007/11787006_1

L. Sankar, S. R. Rajagopalan, and H. V. Poor, A theory of privacy and utility in databases, " under revision, IEEE Trans. Inform. Forensics and Security

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

H. Yamamoto, A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.6, pp.918-923, 1983.
DOI : 10.1109/TIT.1983.1056749

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proc. 3rd IACR Theory Crypto. Conf, 2006.
DOI : 10.1007/11681878_14

R. Agrawal, A. Evfimievski, and R. Srikant, Data security and protection: Information sharing across private databases, Proc. ACM Intl. Conf. Management Data, pp.86-97, 2003.
DOI : 10.1145/872757.872771

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. C. Wong and E. Lo, Competitive Privacy: Secure Analysis on Integrated Sequence Data, Proc. Database Syst, pp.168-175, 2010.
DOI : 10.1007/978-3-642-12098-5_13

L. Sankar, S. Kar, R. Tandon, and H. V. Poor, Competitive privacy in the smart grid: An information-theoretic approach, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2011.
DOI : 10.1109/SmartGridComm.2011.6102322

E. V. Belmega, L. Sankar, H. V. Poor, and M. Debbah, Pricing mechanisms for cooperative state estimation, 2012 5th International Symposium on Communications, Control and Signal Processing, pp.1-4, 2012.
DOI : 10.1109/ISCCSP.2012.6217856

URL : https://hal.archives-ouvertes.fr/hal-00771239

L. Varshney and D. Oppenheim, On Cross-Enterprise Collaboration, Business Process Management, pp.29-37, 2011.
DOI : 10.1016/j.emj.2008.04.003

E. V. Belmega, L. Sankar, and H. V. Poor, Repeated games for privacy-aware distributed state estimation in the smart grid, Intl. Conf. on Network Games, 2012.

G. Kalogridis, C. Efthymiou, S. Z. Denic, T. A. Lewis, and R. Cepeda, Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures, 2010 First IEEE International Conference on Smart Grid Communications, pp.232-237, 2010.
DOI : 10.1109/SMARTGRID.2010.5622047

D. Varodayan and A. Khisti, Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011.
DOI : 10.1109/ICASSP.2011.5946886

V. Rastogi and S. Nath, Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, pp.735-746, 2010.
DOI : 10.1145/1807167.1807247

L. Sankar, S. R. Rajagopalan, S. Mohajer, and H. V. Poor, Smart Meter Privacy: A Theoretical Framework, IEEE Transactions on Smart Grid, vol.4, issue.2, pp.1-10, 2012.
DOI : 10.1109/TSG.2012.2211046

L. Lai, S. Ho, and H. V. Poor, Privacy???Security Trade-Offs in Biometric Security Systems???Part I: Single Use Case, IEEE Transactions on Information Forensics and Security, vol.6, issue.1, pp.122-139, 2011.
DOI : 10.1109/TIFS.2010.2098872

S. Reardon, FBI launches $1 billion face recognition project, NewScientist, 2012.

Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk et al., Privacy-Preserving Face Recognition, LNCS, vol.5672, pp.235-253, 2007.
DOI : 10.1007/978-3-642-03168-7_14

G. Fanti, M. Finiasz, and K. Ramchandran, Private media search on public databases

C. Yeo, P. Ahammad, H. Zhang, and K. Ramchandran, Rate-efficient visual correspondences using random projections, Proc. IEEE Intl. Conf. on Image Processing, pp.217-220, 2008.