Login / Signup

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation.

Iftach HaitnerNoam MazorRonen ShaltielJad Silbak
Published in: TCC (1) (2019)
Keyphrases
  • differentially private
  • differential privacy
  • data sets
  • data mining
  • knowledge discovery
  • data management
  • database applications
  • private data