-
1
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
N. Eagle and A. Pentland, "Social serendipity: Mobilizing social software," IEEE Pervasive Computing, vol. 4, no. 2, pp. 28-34, 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
2
-
-
77951557185
-
Fusing mobile, sensor, and social data to fully enable context-aware computing
-
New York, NY, USA: ACM
-
A. Beach, M. Gartrell, X. Xing, R. Han, Q. Lv, S. Mishra, and K. Seada, "Fusing mobile, sensor, and social data to fully enable context-aware computing," in HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. New York, NY, USA: ACM, 2010, pp. 60-65.
-
(2010)
HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
, pp. 60-65
-
-
Beach, A.1
Gartrell, M.2
Xing, X.3
Han, R.4
Lv, Q.5
Mishra, S.6
Seada, K.7
-
3
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Washington, DC, USA: IEEE Computer Society
-
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2008, pp. 111-125.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
5
-
-
77951578596
-
Preserving privacy in location-based mobile social applications
-
New York, NY, USA: ACM
-
K. P. N. Puttaswamy and B. Y. Zhao, "Preserving privacy in location-based mobile social applications," in HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. New York, NY, USA: ACM, 2010, pp. 1-6.
-
(2010)
HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
, pp. 1-6
-
-
Puttaswamy, K.P.N.1
Zhao, B.Y.2
-
6
-
-
35448936042
-
Smokescreen: Flexible privacy controls for presence-sharing
-
New York, NY, USA: ACM
-
L. P. Cox, A. Dalton, and V. Marupadi, "Smokescreen: flexible privacy controls for presence-sharing," in MobiSys '07: Proceedings of the 5th international conference on Mobile systems, applications and services. New York, NY, USA: ACM, 2007, pp. 233-245.
-
(2007)
MobiSys '07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 233-245
-
-
Cox, L.P.1
Dalton, A.2
Marupadi, V.3
-
7
-
-
77951556632
-
Toward trustworthy mobile sensing
-
New York, NY, USA: ACM
-
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, "Toward trustworthy mobile sensing," in HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. New York, NY, USA: ACM, 2010, pp. 31-36.
-
(2010)
HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
, pp. 31-36
-
-
Gilbert, P.1
Cox, L.P.2
Jung, J.3
Wetherall, D.4
-
8
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
October
-
L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, October 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
9
-
-
84990966245
-
Privacy protection: P-sensitive k-anonymity property
-
T. Truta and B. Vinay, "Privacy protection: p-sensitive k-anonymity property," in Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on, 2006, pp. 94-94.
-
Data Engineering Workshops, 2006. Proceedings. 22nd International Conference On, 2006
, pp. 94-94
-
-
Truta, T.1
Vinay, B.2
-
10
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, no. 1, p. 3, 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
13
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Mondrian multidimensional k-anonymity," in Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on, 2006, pp. 25-25.
-
Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference On, 2006
, pp. 25-25
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
14
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Trans. on Knowl. and Data Eng., vol. 13, no. 6, pp. 1010-1027, 2001.
-
(2001)
IEEE Trans. on Knowl. and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
15
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
New York, NY, USA: ACM
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Incognito: efficient full-domain k-anonymity," in SIGMOD '05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data. New York, NY, USA: ACM, 2005, pp. 49-60.
-
(2005)
SIGMOD '05: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
16
-
-
52649086216
-
Injector: Mining background knowledge for data anonymization
-
Washington, DC, USA: IEEE Computer Society
-
T. Li and N. Li, "Injector: Mining background knowledge for data anonymization," in ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. Washington, DC, USA: IEEE Computer Society, 2008, pp. 446-455.
-
(2008)
ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
, pp. 446-455
-
-
Li, T.1
Li, N.2
-
17
-
-
34250669245
-
On the efficiency of checking perfect privacy
-
New York, NY, USA: ACM
-
A. Machanavajjhala and J. Gehrke, "On the efficiency of checking perfect privacy," in PODS '06: Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. New York, NY, USA: ACM, 2006, pp. 163-172.
-
(2006)
PODS '06: Proceedings of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 163-172
-
-
Machanavajjhala, A.1
Gehrke, J.2
-
19
-
-
74549215147
-
A Fast SOP Minimizer for Logic Funcions Described by Many Product Terms
-
IEEE Computer Society
-
P. Fiser and D. Toman, "A Fast SOP Minimizer for Logic Funcions Described by Many Product Terms," in Proceedings of the 2009 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools. IEEE Computer Society, 2009, pp. 757-764.
-
(2009)
Proceedings of the 2009 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools
, pp. 757-764
-
-
Fiser, P.1
Toman, D.2
-
20
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
Washington, DC, USA: IEEE Computer Society
-
J. Domingo-Ferrer and V. Torra, "A critique of k-anonymity and some of its enhancements," in ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. Washington, DC, USA: IEEE Computer Society, 2008, pp. 990-993.
-
(2008)
ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
, pp. 990-993
-
-
Domingo-Ferrer, J.1
Torra, V.2
|