-
1
-
-
34250661905
-
Achieving anonymity via clustering
-
In
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In ACM-SIGMOD Symposium on Principles of Database Systems (PODS), pages 153-162, 2006.
-
(2006)
ACM-SIGMOD Symposium on Principles of Database Systems (PODS)
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. Journal of Privacy Technology, 2005.
-
(2005)
Journal of Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
35048875418
-
Secure computation of the kth-ranked element
-
In
-
G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the kth-ranked element. In EUROCRYPT, pages 40-55, 2004.
-
(2004)
EUROCRYPT
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
5
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
M. Barbaro and T. Zeller. A face is exposed for AOL searcher no. 4417749. New York Times, 2006.
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
7
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
In
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: The SuLQ framework. In ACM-SIGMOD Symposium on Principles of Database Systems (PODS), pages 128-138, 2005.
-
(2005)
ACM-SIGMOD Symposium on Principles of Database Systems (PODS)
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
9
-
-
0042734800
-
The" GeneTrustee": A universal identification system that ensures privacy and confidentiality for human genetic databases
-
L. Burnett, K. Barlow-Stewart, A. Proos, and H. Aizenberg. The" GeneTrustee": A universal identification system that ensures privacy and confidentiality for human genetic databases. Journal of Law and Medicine, 10(4):506, 2003.
-
(2003)
Journal of Law and Medicine
, vol.10
, Issue.4
, pp. 506
-
-
Burnett, L.1
Barlow-Stewart, K.2
Proos, A.3
Aizenberg, H.4
-
11
-
-
1542506278
-
Algorithms for dense graphs and networks on the random access computer
-
J. Cheriyan and K. Mehlhorn. Algorithms for dense graphs and networks on the random access computer. Algorithmica, 15:521-549, 1996.
-
(1996)
Algorithmica
, vol.15
, pp. 521-549
-
-
Cheriyan, J.1
Mehlhorn, K.2
-
12
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429-444, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
14
-
-
0026995978
-
On the hardness of computing the permanent of random matrices
-
In
-
U. Feige and C. Lund. On the hardness of computing the permanent of random matrices. In ACM Symposium on Theory of Computing (STOC), pages 643-654, 1992.
-
(1992)
ACM Symposium on Theory of Computing (STOC)
, pp. 643-654
-
-
Feige, U.1
Lund, C.2
-
16
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. Fung, K. Wang, R. Chen, and P. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (CSUR), 42(4):1-53, 2010.
-
(2010)
ACM Computing Surveys (CSUR)
, vol.42
, Issue.4
, pp. 1-53
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
17
-
-
0001975984
-
Self-testing/correcting for polynomials and for approximate functions
-
In
-
P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson. Self-testing/correcting for polynomials and for approximate functions. In ACM Symposium on Theory of Computing (STOC), pages 32-42, 1991.
-
(1991)
ACM Symposium on Theory of Computing (STOC)
, pp. 32-42
-
-
Gemmell, P.1
Lipton, R.2
Rubinfeld, R.3
Sudan, M.4
Wigderson, A.5
-
18
-
-
0000377057
-
Highly resilient correctors for polynomials
-
Inf
-
P. Gemmell and M. Sudan. Highly resilient correctors for polynomials. Inf. Process. Lett., 43:169-174, 1992.
-
(1992)
Process. Lett.
, vol.43
, pp. 169-174
-
-
Gemmell, P.1
Sudan, M.2
-
21
-
-
78651539208
-
Efficient anonymizations with enhanced utility
-
J. Goldberger and T. Tassa. Efficient anonymizations with enhanced utility. Transactions on Data Privacy, 3:149-175, 2010.
-
(2010)
Transactions on Data Privacy
, vol.3
, pp. 149-175
-
-
Goldberger, J.1
Tassa, T.2
-
23
-
-
4243139497
-
A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries
-
M. Jerrum, A. Sinclair, and E. Vigoda. A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. Journal of the ACM, 51:671-697, 2004.
-
(2004)
Journal of the ACM
, vol.51
, pp. 671-697
-
-
Jerrum, M.1
Sinclair, A.2
Vigoda, E.3
-
30
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and ℓ-diversity
-
In
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In ICDE, pages 106-115, 2007.
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
32
-
-
33749607006
-
L-Diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-Diversity: Privacy beyond k-anonymity. In International Conference on Data Engineering (ICDE), page 24, 2006.
-
(2006)
International Conference on Data Engineering (ICDE)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
34
-
-
34548689125
-
Thoughts on k-anonymization
-
M. E. Nergiz and C. Clifton. Thoughts on k-anonymization. Data Knowl. Eng., 63(3):622-645, 2007.
-
(2007)
Data Knowl. Eng.
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
35
-
-
35448962139
-
Approximate algorithms for k-anonymity
-
H. Park and K. Shim. Approximate algorithms for k-anonymity. In ACM-SIGMOD Conference, pages 67-78, 2007.
-
(2007)
ACM-SIGMOD Conference
, pp. 67-78
-
-
Park, H.1
Shim, K.2
-
40
-
-
0001790593
-
Depth-first search and linear graph algorithms
-
R. Tarjan. Depth-first search and linear graph algorithms. SIAM Journal on Computing, 1(2):146-160, 1972.
-
(1972)
SIAM Journal on Computing
, vol.1
, Issue.2
, pp. 146-160
-
-
Tarjan, R.1
-
42
-
-
38049087648
-
Generating microdata with p-sensitive k-anonymity property
-
T. Truta, A. Campan, and P. Meyer. Generating microdata with p-sensitive k-anonymity property. In Secure Data Management (SDM), pages 124-141, 2007.
-
(2007)
Secure Data Management (SDM)
, pp. 124-141
-
-
Truta, T.1
Campan, A.2
Meyer, P.3
-
44
-
-
49249151236
-
The complexity of computing the permanent
-
L. Valiant. The complexity of computing the permanent. Theoretical Computer Science, 8:189-201, 1979.
-
(1979)
Theoretical Computer Science
, vol.8
, pp. 189-201
-
-
Valiant, L.1
-
46
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. Wong, A. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In International Conference on Very Large Data Bases (VLDB), pages 543-554, 2007.
-
(2007)
International Conference on Very Large Data Bases (VLDB)
, pp. 543-554
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Pei, J.4
-
47
-
-
33749571958
-
(α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
R. Wong, J. Li, A. Fu, and K. Wang. (α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pages 754-759, 2006.
-
(2006)
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 754-759
-
-
Wong, R.1
Li, J.2
Fu, A.3
Wang, K.4
|