{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:14:28Z","timestamp":1766733268906,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["Grant EP\/M013-286\/1"],"award-info":[{"award-number":["Grant EP\/M013-286\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011105","name":"European Commission","doi-asserted-by":"publisher","award":["H2020-DS-2014-653497 PANORAMIX"],"award-info":[{"award-number":["H2020-DS-2014-653497 PANORAMIX"]}],"id":[{"id":"10.13039\/100011105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243765","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"247-264","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Tight on Budget?"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Meiser","sequence":"first","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Esfandiar","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"volume-title":"Rothblum","year":"2016","author":"Dwork Cynthia","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591883"},{"volume-title":"2014 IEEE International Symposium on Information Theory (ISIT). IEEE, 2371--2375","author":"Geng Q.","key":"e_1_3_2_2_10_1"},{"volume-title":"Privacy in Search Logs. CoRR","year":"2009","author":"G\u00f6tz Michaela","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1880999.1881044"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"volume-title":"2016 IEEE International Symposium on Information Theory (ISIT). IEEE","author":"Kalantari K.","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_2_17_1","unstructured":"Sebastian Meiser. 2018. Approximate and Probabilistic Differential Privacy Definitions. (2018).  Sebastian Meiser. 2018. Approximate and Probabilistic Differential Privacy Definitions. (2018)."},{"key":"e_1_3_2_2_18_1","unstructured":"Sebastian Meiser and Esfandiar Mohammadi. {n. d.}. Implementation of privacy buckets (improved implementation by David Sommer) including FAQ. https:\/\/github.com\/dabingo\/privacybuckets. (. {n. d.}).  Sebastian Meiser and Esfandiar Mohammadi. {n. d.}. Implementation of privacy buckets (improved implementation by David Sommer) including FAQ. https:\/\/github.com\/dabingo\/privacybuckets. (. {n. d.})."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_7"},{"volume-title":"Vadhan","year":"2015","author":"Murtagh Jack","key":"e_1_3_2_2_22_1"},{"volume-title":"Privacy Odometers and Filters: Pay-as-you-Go Composition Advances in Neural Information Processing Systems 29. Curran Associates","year":"1921","author":"Rogers Ryan M","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","unstructured":"David Sommer Aritra Dhar Luka Malitsa Esfandiar Mohammadi Daniel Ronzani and Srdjan Capkun. 2017. Anonymous Communication for Messengers via \"Forced\" Participation. Technical report available under https:\/\/eprint.iacr.org\/2017\/191. (2017).  David Sommer Aritra Dhar Luka Malitsa Esfandiar Mohammadi Daniel Ronzani and Srdjan Capkun. 2017. Anonymous Communication for Messengers via \"Forced\" Participation. Technical report available under https:\/\/eprint.iacr.org\/2017\/191. (2017)."},{"key":"e_1_3_2_2_25_1","unstructured":"J. Tang A. Korolova X. Bai X. Wang and X. Wang. 2017. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. ArXiv e-prints (2017). {arxiv}1709.02753  J. Tang A. Korolova X. Bai X. Wang and X. Wang. 2017. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. ArXiv e-prints (2017). {arxiv}1709.02753"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243765","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:17Z","timestamp":1750212497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243765"}},"subtitle":["Tight Bounds for r-Fold Approximate Differential Privacy"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":25,"alternative-id":["10.1145\/3243734.3243765","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243765","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}