K-anonymity

Results: 35



#Item
1

On the Impact of Social Network Profiling on Anonymity Claudia Diaz1 , Carmela Troncoso1, and Andrei Serjantov2 1 K.U. Leuven ESAT-COSIC

Add to Reading List

Source URL: carmelatroncoso.com

Language: English - Date: 2015-11-19 22:16:28
    2Anonymity / Privacy / Mathematics / K-anonymity / Structure / L-diversity / Tuple / Finitary relation

    Non-homogeneous Generalization in Privacy Preserving Data Publishing ∗ W. K. Wong, Nikos Mamoulis and David W. Cheung Department of Computer Science, The University of Hong Kong

    Add to Reading List

    Source URL: event.cwi.nl

    Language: English - Date: 2010-08-10 12:02:00
    3Anonymity / Privacy / Information / Statistics / Knowledge / Categorical data / Multivariate statistics / Dimension reduction / K-anonymity / Data anonymization / Mosaic plot / Contingency table

    STATISTICAL DISCLOSURE CONTROL FOR MICRODATA: A PRACTICE G UIDE THIJS BENSCHOP CATHRINE MACHINGAUTA MATTHEW WELCH July 2016 Version 1.1

    Add to Reading List

    Source URL: www.ihsn.org

    Language: English - Date: 2016-07-28 08:44:49
    4Privacy / Internet privacy / Targeted advertising / K-anonymity / Anonymity / Personal /  Inc.

    Location Based Advertising and Location kAnonymity How can our location information be kept

    Add to Reading List

    Source URL: zoo.cs.yale.edu

    Language: English - Date: 2011-11-17 20:57:35
    5Data modeling / Anonymity / Privacy / Relational model / Data protection / K-anonymity / Column / Row / Data anonymization / Table / Trie

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-02-13 02:42:25
    6

    Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression  Pierangela Samarati Latanya Sweeney

    Add to Reading List

    Source URL: dataprivacylab.org

    Language: English - Date: 2013-10-01 06:58:18
      7

      Unraveling an Old Cloak: k-anonymity for Location Privacy Reza Shokri† , Carmela Troncoso‡ , Claudia Diaz‡ , Julien Freudiger† , and Jean-Pierre Hubaux† ‡ †

      Add to Reading List

      Source URL: www.shokri.org

      Language: English - Date: 2015-05-28 18:54:40
        8

        L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; ACHIEVING k-ANONYMITY PRIVACY

        Add to Reading List

        Source URL: dataprivacylab.org

        Language: English - Date: 2013-10-01 06:58:18
          9Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

          On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2006-10-10 13:39:42
          UPDATE