-
3
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
E. Bertino and S. Ravi, "Database security-concepts, approaches, and challenges," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19, 2005
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Ravi, S.2
-
4
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
L. Li, M. Kantarcioglu, and B. Thuraisingham, "The applicability of the perturbation based privacy preserving data mining for real-world data," Data & Knowledge Engineering, vol. 65, no. 1, pp. 5-21, 2008
-
(2008)
Data & Knowledge Engineering
, vol.65
, Issue.1
, pp. 5-21
-
-
Li, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
5
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
6
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity," in International Conference on Data Engineering (ICDE), 2006
-
(2006)
International Conference on Data Engineering (ICDE
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
8
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
11
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in ACM MobiSys, 2003
-
(2003)
ACM MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
14
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008
-
(2008)
IEEE Trans. Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
16
-
-
84883081776
-
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
-
Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: Attacks and countermeasures," in IEEE INFOCOM, 2013
-
(2013)
IEEE INFOCOM
-
-
Gao, Z.1
Zhu, H.2
Liu, Y.3
Li, M.4
Cao, Z.5
-
18
-
-
0003555229
-
-
PhD thesis Department of Electrical Engineering Linköping University
-
N. Bergman, Recursive Bayesian Estimation. PhD thesis, Department of Electrical Engineering, Linköping University, 1999
-
(1999)
Recursive Bayesian Estimation
-
-
Bergman, N.1
-
21
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
22
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570, 2002
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
23
-
-
36549043405
-
Protecting location privacy with personalized kanonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE transaction on mobile computing, vol. 7, no. 1, 2008
-
(2008)
IEEE Transaction on Mobile Computing
, vol.7
, Issue.1
-
-
Gedik, B.1
Liu, L.2
-
24
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
G. Aggrawal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, "Approximation algorithms for k-anonymity," Journal of Privacy Technology, 2005
-
(2005)
Journal of Privacy Technology
-
-
Aggrawal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
25
-
-
80051968910
-
Quantifying location privacy
-
R. Shokri, G. Theodorakopoulos, J. Boudec, and J. Hubaux, "Quantifying location privacy," in IEEE Symposium on Security and Privacy, 2011
-
(2011)
IEEE Symposium on Security and Privacy
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.3
Hubaux, J.4
-
26
-
-
84856950755
-
An assessment of the near-term viability of accommodating wireless broadband systems in the 1675-1710 mhz, 1755-1780 mhz, 3500-3650 mhz, 4200-4220 mhz, and 4380-4400 mhz bands
-
NTIA
-
NTIA, "An assessment of the near-term viability of accommodating wireless broadband systems in the 1675-1710 mhz, 1755-1780 mhz, 3500-3650 mhz, 4200-4220 mhz, and 4380-4400 mhz bands," in NTIA:Fast Track Report, 2010
-
(2010)
NTIA:Fast Track Report
-
-
-
28
-
-
84902134265
-
Capacity considerations for secondary networks in tv white space
-
abs/1304.1785
-
F. Hessar and S. Roy, "Capacity considerations for secondary networks in tv white space," CoRR, vol. abs/1304.1785, 2013.
-
(2013)
CoRR
-
-
Hessar, F.1
Roy, S.2
|