-
2
-
-
73849126104
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Y. Aumann and Y. Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. Journal of Cryptology, 23(2):281-343, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 281-343
-
-
Aumann, Y.1
Lindell, Y.2
-
3
-
-
84871100918
-
Frequent grams based embedding for privacy preserving record linkage
-
Maui, Hawaii, USA
-
L. Bonomi, L. Xiong, R. Chen, and B. C. Fung. Frequent grams based embedding for privacy preserving record linkage. In ACM CIKM, pages 1597-1601, Maui, Hawaii, USA, 2012.
-
(2012)
ACM CIKM
, pp. 1597-1601
-
-
Bonomi, L.1
Xiong, L.2
Chen, R.3
Fung, B.C.4
-
5
-
-
84920595044
-
A survey of indexing techniques for scalable record linkage and deduplication
-
P. Christen. A survey of indexing techniques for scalable record linkage and deduplication. IEEE Transactions on Knowledge and Data Engineering, 24(9), 2012.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.9
-
-
Christen, P.1
-
6
-
-
84889610061
-
Preparation of a real voter data set for record linkage and duplicate detection research
-
P. Christen. Preparation of a real voter data set for record linkage and duplicate detection research. Technical report, Australian National University, 2013.
-
(2013)
Technical Report, Australian National University
-
-
Christen, P.1
-
7
-
-
67650700151
-
Accurate synthetic generation of realistic personal information
-
Springer LNAI Bangkok, Thailand
-
P. Christen and A. Pudjijono. Accurate synthetic generation of realistic personal information. In PAKDD, Springer LNAI, volume 5476, pages 507-514, Bangkok, Thailand, 2009.
-
(2009)
PAKDD
, vol.5476
, pp. 507-514
-
-
Christen, P.1
Pudjijono, A.2
-
8
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
C. Clifton, M. Kantarcioglu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu. Privacy-preserving data integration and sharing. In ACM SIGMOD workshop on Research issues in Data Mining and Knowledge Discovery, pages 19-26, 2004.
-
(2004)
ACM SIGMOD Workshop on Research issues in Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
Kantarcioglu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
9
-
-
84864232555
-
Adaptive windows for duplicate detection
-
U. Draisbach, F. Naumann, S. Szott, and O. Wonneberg. Adaptive windows for duplicate detection. In ICDE, pages 1073-1083, 2012.
-
(2012)
ICDE
, pp. 1073-1083
-
-
Draisbach, U.1
Naumann, F.2
Szott, S.3
Wonneberg, O.4
-
11
-
-
70349305273
-
Differential privacy: A survey of results
-
Springer
-
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19. Springer, 2008.
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
12
-
-
78049382188
-
Privacy-preserving record linkage
-
Springer LNCS 6344 Corfu, Greece
-
R. Hall and S. Fienberg. Privacy-preserving record linkage. In Privacy in Statistical Databases, Springer LNCS 6344, pages 269-283, Corfu, Greece, 2010.
-
(2010)
Privacy in Statistical Databases
, pp. 269-283
-
-
Hall, R.1
Fienberg, S.2
-
13
-
-
0013331361
-
Real-world data is dirty: Data cleansing and the merge/purge problem
-
M. A. Hernandez and S. J. Stolfo. Real-world data is dirty: Data cleansing and the merge/purge problem. Data Mining and Knowledge Discovery, 2(1), 1998.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.1
-
-
Hernandez, M.A.1
Stolfo, S.J.2
-
14
-
-
52649087713
-
A hybrid approach to private record linkage
-
A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco. A hybrid approach to private record linkage. In IEEE ICDE, pages 496-505, 2008.
-
(2008)
IEEE ICDE
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
15
-
-
77952279809
-
Private record matching using differential privacy
-
A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino. Private record matching using differential privacy. In ACM EDBT, pages 123-134, 2010.
-
(2010)
ACM EDBT
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
16
-
-
39749130001
-
Transforming semi-honest protocols to ensure accountability
-
W. Jiang, C. Clifton, and M. Kantarcioǧlu. Transforming semi-honest protocols to ensure accountability. Data and Knowledge Engineering, 65(1):57-74, 2008.
-
(2008)
Data and Knowledge Engineering
, vol.65
, Issue.1
, pp. 57-74
-
-
Jiang, W.1
Clifton, C.2
Kantarcioǧlu, M.3
-
19
-
-
84873114199
-
A sorted neighborhood approach to multidimensional privacy preserving blocking
-
A. Karakasidis and V. S. Verykios. A sorted neighborhood approach to multidimensional privacy preserving blocking. In IEEE ICDM Workshops, 2012.
-
(2012)
IEEE ICDM Workshops
-
-
Karakasidis, A.1
Verykios, V.S.2
-
20
-
-
79961178764
-
A constraint satisfaction cryptanalysis of bloom filters in private record linkage
-
Springer
-
M. Kuzu, M. Kantarcioglu, E. Durham, and B. Malin. A constraint satisfaction cryptanalysis of Bloom filters in private record linkage. In Privacy Enhancing Technologies, pages 226-245. Springer, 2011.
-
(2011)
Privacy Enhancing Technologies
, pp. 226-245
-
-
Kuzu, M.1
Kantarcioglu, M.2
Durham, E.3
Malin, B.4
-
21
-
-
84904477482
-
Efficient privacy-aware record integration
-
M. Kuzu, M. Kantarcioglu, A. Inan, E. Bertino, E. Durham, and B. Malin. Efficient privacy-aware record integration. In ACM EDBT, 2013.
-
(2013)
ACM EDBT
-
-
Kuzu, M.1
Kantarcioglu, M.2
Inan, A.3
Bertino, E.4
Durham, E.5
Malin, B.6
-
22
-
-
55149114917
-
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
-
L. Lakshmanan, R. T. Ng, and G. Ramesh. On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge. ACM Transactions on Knowledge Discovery from Data, 2(3):13, 2008.
-
(2008)
ACM Transactions on Knowledge Discovery from Data
, vol.2
, Issue.3
, pp. 13
-
-
Lakshmanan, L.1
Ng, R.T.2
Ramesh, G.3
-
25
-
-
35448932873
-
Privacy preserving schema and data matching
-
M. Scannapieco, I. Figotin, E. Bertino, and A. Elmagarmid. Privacy preserving schema and data matching. In ACM SIGMOD, pages 653-664, 2007.
-
(2007)
ACM SIGMOD
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.4
-
28
-
-
49049096931
-
Disclosure risks of distance preserving data transformations
-
Springer
-
E. Turgay, T. Pedersen, Y. Saygin, E. Savaş, and A. Levi. Disclosure risks of distance preserving data transformations. In Scientific and Statistical Database Management, pages 79-94. Springer, 2008.
-
(2008)
Scientific and Statistical Database Management
, pp. 79-94
-
-
Turgay, E.1
Pedersen, T.2
Saygin, Y.3
Savaş, E.4
Levi, A.5
-
29
-
-
84962835282
-
An iterative two-party protocol for scalable privacy-preserving record linkage
-
Sydney
-
D. Vatsalan and P. Christen. An iterative two-party protocol for scalable privacy-preserving record linkage. In AusDM, CRPIT, Volume 134, Sydney, 2012.
-
(2012)
AusDM, CRPIT
, vol.134
-
-
Vatsalan, D.1
Christen, P.2
-
30
-
-
84893619583
-
Sorted nearest neighborhood clustering for efficient private blocking
-
Springer LNAI Gold Coast, Australia
-
D. Vatsalan and P. Christen. Sorted nearest neighborhood clustering for efficient private blocking. In PAKDD, Springer LNAI, volume 7819, pages 341-352, Gold Coast, Australia, 2013.
-
(2013)
PAKDD
, vol.7819
, pp. 341-352
-
-
Vatsalan, D.1
Christen, P.2
-
31
-
-
84870477881
-
An efficient two-party protocol for approximate matching in private record linkage
-
Ballarat, Australia
-
D. Vatsalan, P. Christen, and V. Verykios. An efficient two-party protocol for approximate matching in private record linkage. In AusDM, CRPIT, Volume 121, Ballarat, Australia, 2011.
-
(2011)
AusDM, CRPIT
, vol.121
-
-
Vatsalan, D.1
Christen, P.2
Verykios, V.3
-
32
-
-
84889599807
-
A taxonomy of privacy-preserving record linkage techniques
-
D. Vatsalan, P. Christen, and V. Verykios. A taxonomy of privacy-preserving record linkage techniques. Journal of Information Systems, 38(6):946-969, 2013.
-
(2013)
Journal of Information Systems
, vol.38
, Issue.6
, pp. 946-969
-
-
Vatsalan, D.1
Christen, P.2
Verykios, V.3
|