-
2
-
-
33749606641
-
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE '06, 25 (2006)
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE '06, vol. 25 (2006)
-
-
-
-
3
-
-
28444449426
-
-
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE '05, pp. 217-228 (2005)
-
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE '05, pp. 217-228 (2005)
-
-
-
-
4
-
-
38049126170
-
Efficient k-anonymity using clustering technique
-
Kotagiri, R, Krishna, P.R, Mohania, M, Nantajeewarawat, E, eds, DASFAA '07, Springer, Heidelberg to appear
-
Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymity using clustering technique. In: Kotagiri, R., Krishna, P.R., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA '07. LNCS, vol. 4443. Springer, Heidelberg (to appear, 2007)
-
(2007)
LNCS
, vol.4443
-
-
Byun, J.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
5
-
-
33749582207
-
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.C.: Utility-based anonymization using local recoding. In: KDD '06, pp. 785-790 (2006)
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.C.: Utility-based anonymization using local recoding. In: KDD '06, pp. 785-790 (2006)
-
-
-
-
6
-
-
35248900307
-
-
Loukides, G., Shao, J.: Capturing data usefulness and privacy protection in kanonymisation. In: SAC '07, pp. 370-374 (2007)
-
Loukides, G., Shao, J.: Capturing data usefulness and privacy protection in kanonymisation. In: SAC '07, pp. 370-374 (2007)
-
-
-
-
7
-
-
0036367386
-
-
Thaper, N., Guha, S., Indyk, P., Koudas, N.: Dynamic multidimensional histograms. In: SIGMOD '02, pp. 428-439 (2002)
-
Thaper, N., Guha, S., Indyk, P., Koudas, N.: Dynamic multidimensional histograms. In: SIGMOD '02, pp. 428-439 (2002)
-
-
-
-
8
-
-
33749607006
-
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: 1-diversity: Privacy beyond k-anonymity. In: ICDE '06, 24 (2006)
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: 1-diversity: Privacy beyond k-anonymity. In: ICDE '06, vol. 24 (2006)
-
-
-
-
9
-
-
38149080913
-
-
Journal of Privacy Technology
-
Aggarwal, G., Kenthapadi, F., Motwani, K., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology (2005)
-
(2005)
Approximation algorithms for k-anonymity
-
-
Aggarwal, G.1
Kenthapadi, F.2
Motwani, K.3
Panigrahy, R.4
Thomas, D.5
Zhu, A.6
-
10
-
-
0034592784
-
-
McCallum, A., Nigam, K., Ungar, L.: Efficient clustering of high-dimensional data sets with application to reference matching. In: KDD '00, pp. 169-178 (2000)
-
McCallum, A., Nigam, K., Ungar, L.: Efficient clustering of high-dimensional data sets with application to reference matching. In: KDD '00, pp. 169-178 (2000)
-
-
-
-
11
-
-
0032091595
-
Cure: An efficient clustering algorithm for large databases
-
Guha, S., Rastogi, R., Shim, K.: Cure: an efficient clustering algorithm for large databases. In: SIGMOD '98, pp. 73-84 (1998)
-
(1998)
SIGMOD '98
, pp. 73-84
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
12
-
-
14244260513
-
Privacy preserving clustering by data transformation
-
Oliveira, S., Zaiane, O.: Privacy preserving clustering by data transformation. In: Proceedings of the XVIII SBBD, pp. 304-318 (2003)
-
(2003)
Proceedings of the XVIII SBBD
, pp. 304-318
-
-
Oliveira, S.1
Zaiane, O.2
-
13
-
-
84945709355
-
An algorithm for finding best matches in logarithmic time
-
Friedman, J., Bentley, J., Finkel, R.: An algorithm for finding best matches in logarithmic time. ACM Trans. on Mathematical Software 3(3) (1977)
-
(1977)
ACM Trans. on Mathematical Software
, vol.3
, Issue.3
-
-
Friedman, J.1
Bentley, J.2
Finkel, R.3
-
15
-
-
28044469490
-
Maxdiff kd-trees for data condensation
-
Narayan, B., Murthy, C., Pal, S.K.: Maxdiff kd-trees for data condensation. Pattern Recognition Letters 27, 187-200 (2006)
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 187-200
-
-
Narayan, B.1
Murthy, C.2
Pal, S.K.3
-
16
-
-
33750732631
-
Secure anonymization for incremental datasets
-
Byun, J., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets. In: Secure Data Management '06, pp. 48-63 (2006)
-
(2006)
Secure Data Management '06
, pp. 48-63
-
-
Byun, J.1
Sohn, Y.2
Bertino, E.3
Li, N.4
|