{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:28:27Z","timestamp":1756636107236},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642241772"},{"type":"electronic","value":"9783642241789"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24178-9_11","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:49:45Z","timestamp":1315406985000},"page":"148-162","source":"Crossref","is-referenced-by-count":39,"title":["Differentially Private Billing with Rebates"],"prefix":"10.1007","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[]},{"given":"Markulf","family":"Kohlweiss","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"Rial","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: The Ninth Workshop on the Economics of Information Security (2010)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys 2010), Zurich, Switzerland (November 2010)","DOI":"10.1145\/1878431.1878446"},{"key":"11_CR3","unstructured":"Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I., Geuens, C.: Pretp: Privacy-preserving electronic toll pricing. In: USENIX Security Symposium, pp. 63\u201378. USENIX Association (2010)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Bohli, J.M., Sorge, C., Ugus, O.: A privacy model for smart metering. In: 2010 IEEE International Conference on Communications Workshops (ICC), pp. 1\u20135 (May 2010)","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. Technical Report MSR-TR-2010-150, Microsoft Research (November 2010)","DOI":"10.1145\/2046556.2046564"},{"key":"11_CR6","first-page":"192","volume-title":"Proceedings of the Fifth ACM Symposium on Operating Systems Principles, SOSP 1975","author":"S.B. Lipner","year":"1975","unstructured":"Lipner, S.B.: A comment on the confinement problem. In: Proceedings of the Fifth ACM Symposium on Operating Systems Principles, SOSP 1975, pp. 192\u2013196. ACM, New York (1975)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"11_CR8","first-page":"174","volume-title":"SODA","author":"C. Dwork","year":"2010","unstructured":"Dwork, C.: Differential privacy in new settings. In: Charikar, M. (ed.) SODA, pp. 174\u2013183. SIAM, Philadelphia (2010)"},{"key":"11_CR9","first-page":"351","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009","author":"A. Ghosh","year":"2009","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 351\u2013360. ACM, New York (2009)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. Cryptology ePrint Archive, Report 2011\/134 (2011), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-24178-9_11"},{"key":"11_CR11","first-page":"273","volume-title":"PODS","author":"B. Barak","year":"2007","unstructured":"Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Libkin, L. (ed.) PODS, pp. 273\u2013282. ACM, New York (2007)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136\u2013145 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"11_CR13","first-page":"12","volume-title":"19th IEEE Computer Security Foundations Workshop","author":"R. Kusters","year":"2006","unstructured":"Kusters, R.: Simulation-based security with inexhaustible interactive turing machines. In: 19th IEEE Computer Security Foundations Workshop, pp. 12\u2013320. IEEE, Los Alamitos (2006)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 268\u2013289. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24178-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T07:41:29Z","timestamp":1686296489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24178-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642241772","9783642241789"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24178-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}