{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:35:49Z","timestamp":1725870949464},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491745"},{"type":"electronic","value":"9783319491752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49175-2_13","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T11:59:42Z","timestamp":1478692782000},"page":"259-278","source":"Crossref","is-referenced-by-count":1,"title":["Almost Perfect Privacy for Additive Gaussian Privacy Filters"],"prefix":"10.1007","author":[{"given":"Shahab","family":"Asoodeh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fady","family":"Alajaji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tam\u00e1s","family":"Linder","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Asoodeh, S., Alajaji, F., Linder, T.: Notes on information-theoretic privacy. In: Proceedings of the 52nd Annual Allerton Conference on Communication, Control, and Computing, pp. 1272\u20131278, September 2014","DOI":"10.1109\/ALLERTON.2014.7028602"},{"key":"13_CR2","unstructured":"Asoodeh, S., Diaz, M., Alajaji, F., Linder, T.: Information extraction under privacy constraints. Information 7(1) (2016). http:\/\/www.mdpi.com\/2078-2489\/7\/1\/15"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Calmon, F.P., Varia, M., M\u00e9dard, M., Christiansen, M.M., Duffy, K.R., Tessaro, S.: Bounds on inference. In: Proceedings of the 51st Annual Allerton Conference on Communication, Control, and Computing, pp. 567\u2013574, October 2013","DOI":"10.1109\/Allerton.2013.6736575"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Asoodeh, S., Alajaji, F., Linder, T.: Privacy-aware MMSE estimation. In: Proceedings of the IEEE International Symposium on Information (ISIT), July 2016. arXiv:1511.02381v3","DOI":"10.1109\/ISIT.2016.7541647"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Makhdoumi, A., Fawaz, N.: Privacy-utility tradeoff under statistical uncertainty. In: Proceedings of the 51st Allerton Conference on Communication, Control, and Computing, pp. 1627\u20131634, October 2013","DOI":"10.1109\/Allerton.2013.6736724"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Calmon, F.P., Makhdoumi, A., M\u00e9dard, M.: Fundamental limits of perfect privacy. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 1796\u20131800 (2015)","DOI":"10.1109\/ISIT.2015.7282765"},{"issue":"2","key":"13_CR7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/18.32120","volume":"35","author":"T Berger","year":"1989","unstructured":"Berger, T., Yeung, R.: Multiterminal source encoding with encoder breakdown. IEEE Trans. Inf. Theor. 35(2), 237\u2013244 (1989)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Reed, I.S.: Information theory and privacy in data banks. In: Proceedings of the National Computer Conference and Exposition, ser. AFIPS 1973, pp. 581\u2013587. ACM, New York (1973)","DOI":"10.1145\/1499586.1499731"},{"issue":"6","key":"13_CR9","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/TIT.1983.1056749","volume":"29","author":"H Yamamoto","year":"1983","unstructured":"Yamamoto, H.: A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers. IEEE Trans. Inf. Theor. 29(6), 918\u2013923 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"6","key":"13_CR10","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TIFS.2013.2253320","volume":"8","author":"L Sankar","year":"2013","unstructured":"Sankar, L., Rajagopalan, S., Poor, H.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8(6), 838\u2013852 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Asoodeh, S., Alajaji, F., Linder, T.: On maximal correlation, mutual information and data privacy. In: Proceedings of the IEEE 14th Canadian Workshop on Information Theory (CWIT), pp. 27\u201331, June 2015","DOI":"10.1109\/CWIT.2015.7255145"},{"issue":"11","key":"13_CR12","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1109\/TKDE.2009.190","volume":"22","author":"D Rebollo-Monedero","year":"2010","unstructured":"Rebollo-Monedero, D., Forne, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE Trans. Knowl. Data Eng. 22(11), 1623\u20131636 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Calmon, F.P.: Information-theoretic metrics for security and privacy. Ph.D. dissertation, MIT, September 2015","DOI":"10.1109\/ALLERTON.2014.7028548"},{"issue":"2","key":"13_CR14","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Anantharam, V., Gohari, A., Kamath, S., Nair, C.: On maximal correlation, hypercontractivity, the data processing inequality studied by Erkip, Cover. Preprint, arXiv:1304.6133v1 (2014)","DOI":"10.1109\/ISIT.2014.6875389"},{"issue":"4","key":"13_CR16","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1109\/TIT.2005.844072","volume":"51","author":"D Guo","year":"2005","unstructured":"Guo, D., Shamai, S., Verd\u00fa, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Trans. Inf. Theor. 51(4), 1261\u20131282 (2005)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"4","key":"13_CR17","doi-asserted-by":"crossref","first-page":"2371","DOI":"10.1109\/TIT.2011.2111010","volume":"57","author":"D Guo","year":"2011","unstructured":"Guo, D., Wu, Y., Shamai, S., Verd\u00fa, S.: Estimation in Gaussian noise: properties of the minimum mean-square error. IEEE Trans. Inf. Theor. 57(4), 2371\u20132385 (2011)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"3","key":"13_CR18","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/BF02024507","volume":"10","author":"A R\u00e9nyi","year":"1959","unstructured":"R\u00e9nyi, A.: On measures of dependence. Acta Mathe. Acad. Scient. Hung. 10(3), 441\u2013451 (1959)","journal-title":"Acta Mathe. Acad. Scient. Hung."},{"key":"13_CR19","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1002\/zamm.19410210604","volume":"21","author":"H Gebelein","year":"1941","unstructured":"Gebelein, H.: Das statistische problem der korrelation als variations- und eigenwert-problem und sein zusammenhang mit der ausgleichungsrechnung. Zeitschrift f ur angew. Math. und Mech. 21, 364\u2013379 (1941)","journal-title":"Zeitschrift f ur angew. Math. und Mech."},{"issue":"4","key":"13_CR20","first-page":"715","volume":"120","author":"O Sarmanov","year":"1958","unstructured":"Sarmanov, O.: The maximum correlation coefficient (nonsymmetric case). Dokl. Akad. Nauk SSSR 120(4), 715\u2013718 (1958)","journal-title":"Dokl. Akad. Nauk SSSR"},{"key":"13_CR21","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley-Interscience, Hoboken (2006)"},{"issue":"1","key":"13_CR22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.2015.2482978","volume":"62","author":"Y Polyanskiy","year":"2016","unstructured":"Polyanskiy, Y., Wu, Y.: Dissipation of information in channels with input constraints. IEEE Trans. Inf. Theor. 62(1), 35\u201355 (2016)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"3","key":"13_CR23","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2011.2174959","volume":"58","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Verd\u00fa, S.: Functional properties of minimum mean-square error and mutual information. IEEE Trans. Inf. Theor. 58(3), 1289\u20131301 (2012)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"3","key":"13_CR24","first-page":"433","volume":"33","author":"VV Prelov","year":"1988","unstructured":"Prelov, V.V.: Capacity of communication channels with almost Gaussian noise. Teor. Veroyatnost. i Primenen. 33(3), 433\u2013452 (1988)","journal-title":"Teor. Veroyatnost. i Primenen."}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49175-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T11:50:51Z","timestamp":1568548251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49175-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491745","9783319491752"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49175-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}