-
1
-
-
70350624866
-
Privacy-preserving data publishing: A survey on recent developments
-
in press
-
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys (in press)
-
ACM Computing Surveys
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
3
-
-
73349125549
-
-
Böttcher, S., Obermeier, S.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. JSW 3(1), 9-17 (2008)
-
Böttcher, S., Obermeier, S.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. JSW 3(1), 9-17 (2008)
-
-
-
-
5
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. VLDB Journal 15(4), 316-333 (2006)
-
(2006)
VLDB Journal
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
7
-
-
70350390432
-
-
Goldreich, O, Secure multi-party computation, Working Draft, Version 1.3 2001
-
Goldreich, O.: Secure multi-party computation, Working Draft, Version 1.3 (2001)
-
-
-
-
9
-
-
70350390430
-
Secure multiparty computation for privacypreserving data mining. Cryptology ePrint Archive
-
Report 2008/197
-
Lindell, Y., Pinkas, B.: Secure multiparty computation for privacypreserving data mining. Cryptology ePrint Archive, Report 2008/197 (2008), http://eprint.iacr.org/
-
(2008)
-
-
Lindell, Y.1
Pinkas, B.2
-
10
-
-
10944270172
-
Privacy-preserving data mining: Why, how, and when
-
Vaidya, J., Clifton, C.: Privacy-preserving data mining: Why, how, and when. IEEE Security & Privacy 2(6), 19-27 (2004)
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 19-27
-
-
Vaidya, J.1
Clifton, C.2
-
12
-
-
0003855464
-
-
2nd edn. John Wiley & Sons, Chichester
-
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
13
-
-
35048875418
-
Secure computation of the kth-ranked element
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Aggarwal, G., Mishra, N., Pinkas, B.: Secure computation of the kth-ranked element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 40-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
14
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010-1027 (2001)
-
(2001)
IEEE Trans. Knowl. Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
16
-
-
33749607006
-
M.: L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proceedings of the International Conference on Data Engineering (ICDE 2006), p. 24 (2006)
-
(2006)
Proceedings of the International Conference on Data Engineering (ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam4
-
18
-
-
70350407331
-
-
Jurczyk, P., Xiong, L.: Distributed anonymization: Achieving privacy for both data subjects and data providers. Technical Report TR-2009-013, Emory University Department of Mathematics and Computer Science (2009)
-
Jurczyk, P., Xiong, L.: Distributed anonymization: Achieving privacy for both data subjects and data providers. Technical Report TR-2009-013, Emory University Department of Mathematics and Computer Science (2009)
-
-
-
-
19
-
-
47749097171
-
Dobjects: Enabling distributed data services for metacomputing platforms
-
Bubak, M, van Albada, G.D, Dongarra, J, Sloot, P.M.A, eds, ICCS 2008, Part I, Springer, Heidelberg
-
Jurczyk, P., Xiong, L.: Dobjects: Enabling distributed data services for metacomputing platforms. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part I. LNCS, vol. 5101, pp. 136-145. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5101
, pp. 136-145
-
-
Jurczyk, P.1
Xiong, L.2
-
21
-
-
84856530175
-
Privacy preserving serial data publishing by role composition
-
Bu, Y., Fu, A.W.C., Wong, R.C.W., Chen, L., Li, J.: Privacy preserving serial data publishing by role composition. Proc. VLDB Endow. 1(1), 845-856 (2008)
-
(2008)
Proc. VLDB Endow
, vol.1
, Issue.1
, pp. 845-856
-
-
Bu, Y.1
Fu, A.W.C.2
Wong, R.C.W.3
Chen, L.4
Li, J.5
|