-
1
-
-
74549205119
-
-
Predict
-
Predict. https://www.predict.org/.
-
-
-
-
2
-
-
74549203149
-
-
Tcpdpriv. http://ita.eee.lbl.gov/html/contrib/tcpdpriv.html.
-
-
-
Tcpdpriv1
-
3
-
-
74549166891
-
-
Tcpurify. http://irg.cs.ohiou.edu/ eblanton/tcpurify.
-
-
-
Tcpurify1
-
5
-
-
4444266989
-
Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
J. Fan, J. Xu, M. H. Ammar, and S. B. Moon. Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Comput. Netw., 46(2):253-272, 2004.
-
(2004)
Comput. Netw
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
6
-
-
8344271233
-
Inferring tcp connection characteristics through passive measurements
-
S. Jaiswal, G. Iannaccone, C. Diot, J. Kurose, and D. Towsley. Inferring tcp connection characteristics through passive measurements. In Proceedings of INFOCOMM, 2004.
-
(2004)
Proceedings of INFOCOMM
-
-
Jaiswal, S.1
Iannaccone, G.2
Diot, C.3
Kurose, J.4
Towsley, D.5
-
7
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
8
-
-
66249097600
-
Privacy-safe network trace sharing via secure queries
-
ACM
-
J. Mirkovic. Privacy-safe network trace sharing via secure queries. In NDA '08, pages 3-10. ACM, 2008.
-
(2008)
NDA '08
, pp. 3-10
-
-
Mirkovic, J.1
-
9
-
-
34248362859
-
Sc2d: An alternative to trace anonymization
-
J. C. Mogul and M. Arlitt. Sc2d: an alternative to trace anonymization. In MineNet '06, pages 323-328, 2006.
-
(2006)
MineNet '06
, pp. 323-328
-
-
Mogul, J.C.1
Arlitt, M.2
-
10
-
-
33847256529
-
The devil and packet trace anonymization
-
January
-
R. Pang, M. Allman, V. Paxon, and J. Lee. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review, 36(1):29-38, January 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxon, V.3
Lee, J.4
-
12
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13(6):1010-1027, 2001.
-
(2001)
IEEE Trans. on Knowl. and Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
13
-
-
33847027721
-
Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
-
A. Slagell and W. Yurcik. Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization. In SECOVAL, pages 80-89, 2005.
-
(2005)
SECOVAL
, pp. 80-89
-
-
Slagell, A.1
Yurcik, W.2
-
14
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness and KB Syst., 10(5):557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzziness and KB Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
15
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. VLDB, 1(1):115-125, 2008.
-
(2008)
VLDB
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
16
-
-
2142754478
-
Association rule hiding
-
V. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16:434-447, 2003.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, pp. 434-447
-
-
Verykios, V.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|