Explores the Partial Secrecy Problem in Information-Theoretic Cryptography, covering topics like secret communication, computational security, and information leakage.
Explores differential privacy, hypothesis testing, and composition of mechanisms, discussing optimal privacy regions and privacy degradation under repeated accesses.