Foundations and Applications of Data Privacy - A Perspective

Foundations and Applications of Data Privacy - A Perspective

Simons Institute via YouTube Direct link

Reconstruction attacks Dinur N '03

7 of 31

7 of 31

Reconstruction attacks Dinur N '03

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Foundations and Applications of Data Privacy - A Perspective

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Considerations in preparing this talk
  3. 3 Layout
  4. 4 Informational Privacy: The Problem
  5. 5 When is informational privacy preserved?
  6. 6 Reconstruction attacks [Dinur N '03]
  7. 7 Reconstruction attacks Dinur N '03
  8. 8 Attacks on traditional privacy enhancing techniques
  9. 9 Reasons for optimism
  10. 10 Reconstruction attacks are useful!
  11. 11 What reconstruction attacks teach us?
  12. 12 Progressing towards a definition
  13. 13 A privacy desiderata
  14. 14 A more realistic privacy desiderata
  15. 15 Differential privacy [Dwork McSherry N Smith 86]
  16. 16 New privacy concepts
  17. 17 What makes a good privacy concept? (2)
  18. 18 What makes a good privacy concept? (3)
  19. 19 What makes a good privacy concept? (4)
  20. 20 Differentially Private Computations
  21. 21 What can be computed with differential Privacy?
  22. 22 What differential privacy is not?
  23. 23 U.S. Census Bureau
  24. 24 GOOGLE
  25. 25 Apple
  26. 26 Some challenges
  27. 27 A perspective talk
  28. 28 Data Privacy: The Problem
  29. 29 A computer scientist and a legal scholar meet at the Simons Institute
  30. 30 What does "protecting individual privacy" mean?
  31. 31 Legal approach

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.