Author of the publication

Optimal Distribution of Privacy Budget in Differential Privacy.

, , , , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 222-236. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linking Differential Identifiability with Differential Privacy., , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 232-247. Springer, (2018)Robustness Assessment of Biometric Authenticators., , and . TrustCom, page 1137-1146. IEEE, (2023)Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption.. DBSec, volume 13383 of Lecture Notes in Computer Science, page 197-214. Springer, (2022)Privacy of Smart Traffic Lights Systems., , , , , and . VNC, page 17-24. IEEE, (2023)A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM., and . DBSec, volume 14901 of Lecture Notes in Computer Science, page 101-108. Springer, (2024)Optimal Distribution of Privacy Budget in Differential Privacy., , , , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 222-236. Springer, (2018)A Framework for Privacy Policy Enforcement for Connected Automotive Systems., and . TrustCom, page 1094-1102. IEEE, (2023)Specification and Deployment of Integrated Security Policies for Outsourced Data., , , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 17-32. Springer, (2014)Confidentiality-Preserving Query Execution of Fragmented Outsourced Data., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 426-440. Springer, (2013)Secure and Robust Cyber Security Threat Information Sharing., , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 3-18. Springer, (2021)