-
1
-
-
0020721991
-
A modular approach to key safeguarding
-
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Information Theory 29(2), 208-210 (1983)
-
(1983)
IEEE Trans. Information Theory
, vol.29
, Issue.2
, pp. 208-210
-
-
Asmuth, C.1
Bloom, J.2
-
2
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proc. of ICDE, pp. 217-228 (2005)
-
(2005)
Proc. of ICDE
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
3
-
-
33749576326
-
Efficient anonymity-preserving data collection
-
ACM, New York
-
Brickell, J., Shmatikov, V.: Efficient anonymity-preserving data collection. In: KDD 2006, pp. 76-85. ACM, New York (2006)
-
(2006)
KDD 2006
, pp. 76-85
-
-
Brickell, J.1
Shmatikov, V.2
-
4
-
-
33745567199
-
-
Damgard, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation, pp. 285-304 (2006)
-
(2006)
Unconditionally Secure Constant-rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
, pp. 285-304
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
6
-
-
84988315609
-
Fast data anonymization with low information loss
-
Ghinita, G., Karras, P., Kalnis, P.,Mamoulis, N.: Fast data anonymization with low information loss. In: Proc. of VLDB, pp. 758-769 (2007)
-
(2007)
Proc. of VLDB
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
8
-
-
34447343339
-
Threshold cryptography based on asmuth-bloom secret sharing
-
Kaya, K., Selçuk, A.A.: Threshold cryptography based on asmuth-bloom secret sharing. Inf. Sci. 177(19), 4148-4160 (2007)
-
(2007)
Inf. Sci.
, vol.177
, Issue.19
, pp. 4148-4160
-
-
Kaya, K.1
Selçuk, A.A.2
-
9
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: Proc. of ACM SIGMOD, pp. 49-60 (2005)
-
(2005)
Proc. of ACM SIGMOD
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
10
-
-
33749607006
-
l-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. of ICDE (2006)
-
Proc. of ICDE (2006)
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
11
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
ACM, New York
-
Meyerson, A.,Williams, R.: On the complexity of optimal k-anonymity. In: PODS 2004, pp. 223-228. ACM, New York (2004)
-
(2004)
PODS 2004
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
12
-
-
0035049112
-
Analysis of the clustering properties of the hilbert space-filling curve
-
Moon, B., Jagadish, H.v., Faloutsos, C., Saltz, J.H.: Analysis of the clustering properties of the hilbert space-filling curve. IEEE TKDE 13(1), 124-141 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.V.2
Faloutsos, C.3
Saltz, J.H.4
-
14
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
abstract
-
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Proc. of ACM PODS, p. 188 (1998)
-
(1998)
Proc. of ACM PODS
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
15
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
32344451483
-
Anonymity-preserving data collection
-
ACM, New York
-
Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: KDD 2005, pp. 334-343. ACM, New York (2005)
-
(2005)
KDD 2005
, pp. 334-343
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
18
-
-
67549084348
-
k-anonymous data collection
-
Zhong, S., Yang, Z., Chen, T.: k-anonymous data collection. Inf. Sci. 179(17), 2948-2963 (2009)
-
(2009)
Inf. Sci.
, vol.179
, Issue.17
, pp. 2948-2963
-
-
Zhong, S.1
Yang, Z.2
Chen, T.3
-
19
-
-
33244463520
-
Privacy-enhancing k-anonymization of customer data
-
ACM, New York
-
Zhong, S., Yang, Z.,Wright, R.N.: Privacy-enhancing k-anonymization of customer data. In: PODS 2005, pp. 139-147. ACM, New York (2005)
-
(2005)
PODS 2005
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
|