-
2
-
-
0001410581
-
Statistical disclosure limitation practices at united states statistical agencies
-
Jabine, T. B.: Statistical disclosure limitation practices at united states statistical agencies. J. Off. Stat. 9(2), 427-454 (1993).
-
(1993)
J. Off. Stat.
, vol.9
, Issue.2
, pp. 427-454
-
-
Jabine, T.B.1
-
3
-
-
0009184450
-
Public use microdata files: current practices at national statistical bureaus
-
Citteur, C. A. W., Willenborg, L. C. R. J.: Public use microdata files: current practices at national statistical bureaus. J. Off. Stat. 9(4), 783-794 (1993).
-
(1993)
J. Off. Stat.
, vol.9
, Issue.4
, pp. 783-794
-
-
Citteur, C.A.W.1
Willenborg, L.C.R.J.2
-
4
-
-
0036190566
-
Practical data-oriented microaggregation for statistical disclosure control
-
Domingo-Ferrer, J., Mateo-Sanz, J. M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189-201 (2002).
-
(2002)
IEEE Trans. Knowl. Data Eng.
, vol.14
, Issue.1
, pp. 189-201
-
-
Domingo-Ferrer, J.1
Mateo-Sanz, J.M.2
-
5
-
-
26944448516
-
Ordinal, continuous and heterogenerous k-anonymity through microaggregation
-
Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogenerous k-anonymity through microaggregation. Data Min. Knowl. Discov. 11(2), 195-212 (2005).
-
(2005)
Data Min. Knowl. Discov.
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
6
-
-
46749107697
-
VMDAV: a multivariate microaggregation with variable group size
-
Springer, Rome, Italy
-
Solanas, A., Martínez-Ballesté, A., Domingo-Ferrer, J.: VMDAV: a multivariate microaggregation with variable group size. In: Proceedings in Computational Statistics (COMPSTAT), Springer, Rome, Italy (2006).
-
(2006)
In: Proceedings in Computational Statistics (COMPSTAT)
-
-
Solanas, A.1
Martínez-Ballesté, A.2
Domingo-Ferrer, J.3
-
7
-
-
84870754264
-
Private location-based information retrieval via k-anonymous clustering
-
Sept. 2009, Springer, Sardinia, Italy, invited paper
-
Rebollo-Monedero, D., Forné, J., Soriano, M.: Private location-based information retrieval via k-anonymous clustering. In: Proceedings of the CNIT International Workshop on Digital Communication, Series Lecture Notes in Computer Science (LNCS), Sept. 2009, Springer, Sardinia, Italy, invited paper (2009).
-
(2009)
In: Proceedings of the CNIT International Workshop on Digital Communication, Series Lecture Notes in Computer Science (LNCS)
-
-
Rebollo-Monedero, D.1
Forné, J.2
Soriano, M.3
-
8
-
-
0036811662
-
k-Anonymity: a model for protecting privacy
-
Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl. Based Syst. 10(5), 557-570 (2002).
-
(2002)
Int. J. Uncertain. Fuzz. Knowl. Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
9
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010-1027 (2001).
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
10
-
-
34548771295
-
Privacy protection: p-anonymity property
-
Atlanta, GA
-
Truta, T. M., Vinay, B.: Privacy protection: p-anonymity property. In: Proceedings of the International Workshop on Privacy Data Management (PDM), Atlanta, GA, p. 94 (2006).
-
(2006)
In: Proceedings of the International Workshop on Privacy Data Management (PDM)
, pp. 94
-
-
Truta, T.M.1
Vinay, B.2
-
11
-
-
33749607006
-
L-anonymity
-
Atlanta, GA, Apr 2006
-
Machanavajjhala, A., Gehrke, J., Kiefer, D., Venkitasubramanian, M.: l-anonymity. In: Proceedings of the IEEE International Conference on Data Engineering (ICDE), Atlanta, GA, Apr 2006, p. 24 (2006).
-
(2006)
In: Proceedings of the IEEE International Conference on Data Engineering (ICDE)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kiefer, D.3
Venkitasubramanian, M.4
-
12
-
-
35448965488
-
T-diversity
-
Istanbul, Turkey, Apr 2007
-
Li, N., Li, T., Venkatasubramanian, S.: t-diversity. In: Proceedings of the IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, Apr 2007, pp. 106-115 (2007).
-
(2007)
In: Proceedings of the IEEE International Conference on Data Engineering (ICDE)
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
13
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
Las Vegas, NV, Aug 2008
-
Brickell, J., Shmatikov, V.: The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Las Vegas, NV, Aug 2008 (2008).
-
(2008)
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
-
-
Brickell, J.1
Shmatikov, V.2
-
15
-
-
77956995886
-
From t-closeness-like privacy to postrandomization via information theory
-
Nov. 2010. [Online]. Available
-
Rebollo-Monedero, D., Forné, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE Trans. Knowl. Data Eng., 22(11), 1623-1636, Nov. 2010. [Online]. Available: http://doi. ieeecomputersociety. org/10. 1109/TKDE. 2009. 190 (2010).
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
16
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981).
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
18
-
-
0037810717
-
Mixminion: design of a type III anonymous remailer protocol
-
Berkeley, CA, May
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), Berkeley, CA, pp. 2-15, May (2003).
-
(2003)
In: Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
19
-
-
0035060531
-
A formal approach to imperfection in geographic information
-
Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Comput. Environ. Urban Syst. 25(1), 89-103 (2001).
-
(2001)
Comput. Environ. Urban Syst.
, vol.25
, Issue.1
, pp. 89-103
-
-
Duckham, M.1
Mason, K.2
Stell, J.3
Worboys, M.4
-
22
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
Springer, Berkeley, CA, July 2000
-
Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Proceedings of the Designing Privacy Enhancing Technologies: Workshop Design Issues in Anonymity, Unobservability, Series Lecture Notes in Computer Science (LNCS), Springer, Berkeley, CA, July 2000, pp. 30-45 (2000).
-
(2000)
In: Proceedings of the Designing Privacy Enhancing Technologies: Workshop Design Issues in Anonymity, Unobservability, Series Lecture Notes in Computer Science (LNCS)
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
24
-
-
84957800033
-
Towards measuring anonymity
-
Series Lecture Notes in Computer Science (LNCS), Springer, Apr 2002
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET), Series Lecture Notes in Computer Science (LNCS), vol. 2482, pp. 54-68. Springer, Apr 2002 (2002).
-
(2002)
In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET)
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
25
-
-
33845537887
-
Measuring anonymity revisited
-
Nov
-
Tóth, G., Hornák, Z., Vajda, F.: Measuring anonymity revisited. In: Proceedings of the Nordic Workshop on Secure IT Systems, Nov, pp. 85-90 (2004).
-
(2004)
In: Proceedings of the Nordic Workshop on Secure IT Systems
, pp. 85-90
-
-
Tóth, G.1
Hornák, Z.2
Vajda, F.3
-
26
-
-
34547490882
-
Structuring anonymity metrics
-
ACM, Fairfax, VA, Nov 2006
-
Clauß, S., Schiffner, S.: Structuring anonymity metrics. In: Proceedings of the ACM Workshop on Digital Identity Management (DIM), ACM, Fairfax, VA, Nov 2006, pp. 55-62 (2006).
-
(2006)
In: Proceedings of the ACM Workshop on Digital Identity Management (DIM)
, pp. 55-62
-
-
Clauß, S.1
Schiffner, S.2
-
28
-
-
31844446595
-
A formalization of anonymity and onion routing
-
Lecture Notes in Computer Science (LNCS)
-
Mauw, S., Verschuren, J., de Vink, E. P.: A formalization of anonymity and onion routing. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. 3193. Lecture Notes in Computer Science (LNCS), pp. 109-124 (2004).
-
(2004)
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS)
, vol.3193
, pp. 109-124
-
-
Mauw, S.1
Verschuren, J.2
de Vink, E.P.3
-
31
-
-
70349233805
-
Revisiting a combinatorial approach toward measuring anonymity
-
ACM
-
Gierlichs, B., Troncoso, C., Díaz, C., Preneel, B., Verbauwhede, I.: Revisiting a combinatorial approach toward measuring anonymity. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, ACM, pp. 111-116 (2008).
-
(2008)
In: Proceedings of the ACM Workshop on Privacy in the Electronic Society
, pp. 111-116
-
-
Gierlichs, B.1
Troncoso, C.2
Díaz, C.3
Preneel, B.4
Verbauwhede, I.5
-
32
-
-
79961198765
-
An accurate system-wide anonymity metric for probabilistic attacks
-
Springer
-
Bagai, R., Lu, H., Li, R., Tang, B.: An accurate system-wide anonymity metric for probabilistic attacks. In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET), Series Lecture Notes in Computer Science (LNCS), vol. 6794, pp. 117-133, Springer (2011).
-
(2011)
In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET), Series Lecture Notes in Computer Science (LNCS)
, vol.6794
, pp. 117-133
-
-
Bagai, R.1
Lu, H.2
Li, R.3
Tang, B.4
-
33
-
-
74049116479
-
A distortion-based metric for location privacy
-
Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J. P.: A distortion-based metric for location privacy. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society (2009).
-
(2009)
In: Proceedings of the ACM Workshop on Privacy in the Electronic Society
-
-
Shokri, R.1
Freudiger, J.2
Jadliwala, M.3
Hubaux, J.P.4
-
34
-
-
80051968910
-
Quantifying location privacy
-
IEEE Comput. Soc., Washington, DC, USA
-
Shokri, R., Theodorakopoulos, G., Boudec, J. Y. L., Hubaux, J. P.: Quantifying location privacy. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), IEEE Comput. Soc., Washington, DC, USA, pp. 247-262 (2011).
-
(2011)
In: Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.Y.L.3
Hubaux, J.P.4
-
37
-
-
0003922190
-
-
2nd edn., New York: Wiley
-
Duda, R. O., Hart, P. E., Stork, D. G.: Pattern Classification, 2nd edn. Wiley, New York (2001).
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
38
-
-
0039048754
-
A sandwich proof of the Shannon-McMillan-Breiman theorem
-
Algoet, P. H., Cover, T. M.: A sandwich proof of the Shannon-McMillan-Breiman theorem. Ann. Prob. 16(2), 899-909 (1988).
-
(1988)
Ann. Prob.
, vol.16
, Issue.2
, pp. 899-909
-
-
Algoet, P.H.1
Cover, T.M.2
-
39
-
-
0003214704
-
Coding theorems for a discrete source with a fidelity criterion
-
Shannon, C. E.: Coding theorems for a discrete source with a fidelity criterion. In: IRE National Convention Record, vol. 7, Part 4, pp. 142-163 (1959).
-
(1959)
In: IRE National Convention Record
, vol.7
, Issue.PART 4
, pp. 142-163
-
-
Shannon, C.E.1
-
40
-
-
0018689571
-
An algorithm for tracking multiple targets
-
Reid, D. B.: An algorithm for tracking multiple targets. IEEE Trans. Autom. Control 24(6), 843-854 (1979).
-
(1979)
IEEE Trans. Autom. Control
, vol.24
, Issue.6
, pp. 843-854
-
-
Reid, D.B.1
-
41
-
-
77956890234
-
Monte carlo sampling methods using markov chains and their applications
-
Hastings, W. K.: Monte carlo sampling methods using markov chains and their applications. Biometrika 57(1), 97-109 (1970).
-
(1970)
Biometrika
, vol.57
, Issue.1
, pp. 97-109
-
-
Hastings, W.K.1
|