Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Quantifying location privacy

R Shokri, G Theodorakopoulos… - … IEEE symposium on …, 2011 - ieeexplore.ieee.org
It is a well-known fact that the progress of personal communication devices leads to serious
concerns about privacy in general, and location privacy in particular. As a response to these …

On the foundations of quantitative information flow

G Smith - International Conference on Foundations of Software …, 2009 - Springer
There is growing interest in quantitative theories of information flow in a variety of contexts,
such as secure information flow, anonymity protocols, and side-channel analysis. Such …

Privacy for smart meters: Towards undetectable appliance load signatures

G Kalogridis, C Efthymiou, SZ Denic… - 2010 first IEEE …, 2010 - ieeexplore.ieee.org
Smart grid privacy encompasses the privacy of information extracted by analysing smart
metering data. In this paper, we suggest that home electrical power routing can be used to …

Measures and models of nicotine dependence: positive reinforcement

S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …

Measuring information leakage using generalized gain functions

SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …

On the relation between identifiability, differential privacy, and mutual-information privacy

W Wang, L Ying, J Zhang - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …

Verifying privacy-type properties of electronic voting protocols

S Delaune, S Kremer, M Ryan - Journal of Computer Security, 2009 - content.iospress.com
Electronic voting promises the possibility of a convenient, efficient and secure facility for
recording and tallying votes in an election. Recently highlighted inadequacies of …

Privacy games: Optimal user-centric data obfuscation

R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …

Smart meter privacy with renewable energy and an energy storage device

G Giaconi, D Gündüz, HV Poor - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A smart meter (SM) measures a consumer's electricity consumption and reports it
automatically to a utility provider (UP) in almost real time. Despite many advantages of SMs …