K-anonymity

Results: 35



#Item
1On the Impact of Social Network Profiling on Anonymity Claudia Diaz1 , Carmela Troncoso1, and Andrei Serjantov2 1  K.U. Leuven ESAT-COSIC

On the Impact of Social Network Profiling on Anonymity Claudia Diaz1 , Carmela Troncoso1, and Andrei Serjantov2 1 K.U. Leuven ESAT-COSIC

Add to Reading List

Source URL: carmelatroncoso.com

Language: English - Date: 2015-11-19 22:16:28
    2Non-homogeneous Generalization in Privacy Preserving Data Publishing ∗ W. K. Wong, Nikos Mamoulis and David W. Cheung Department of Computer Science, The University of Hong Kong

    Non-homogeneous Generalization in Privacy Preserving Data Publishing ∗ W. K. Wong, Nikos Mamoulis and David W. Cheung Department of Computer Science, The University of Hong Kong

    Add to Reading List

    Source URL: event.cwi.nl

    Language: English - Date: 2010-08-10 12:02:00
    3STATISTICAL DISCLOSURE CONTROL FOR MICRODATA: A PRACTICE G UIDE THIJS BENSCHOP CATHRINE MACHINGAUTA MATTHEW WELCH July 2016 Version 1.1

    STATISTICAL DISCLOSURE CONTROL FOR MICRODATA: A PRACTICE G UIDE THIJS BENSCHOP CATHRINE MACHINGAUTA MATTHEW WELCH July 2016 Version 1.1

    Add to Reading List

    Source URL: www.ihsn.org

    Language: English - Date: 2016-07-28 08:44:49
    4Location Based Advertising and Location kAnonymity How can our location information be kept

    Location Based Advertising and Location kAnonymity How can our location information be kept

    Add to Reading List

    Source URL: zoo.cs.yale.edu

    Language: English - Date: 2011-11-17 20:57:35
    5ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-02-13 02:42:25
    6Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression  Pierangela Samarati Latanya Sweeney

    Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression  Pierangela Samarati Latanya Sweeney

    Add to Reading List

    Source URL: dataprivacylab.org

    Language: English - Date: 2013-10-01 06:58:18
      7Unraveling an Old Cloak: k-anonymity for Location Privacy Reza Shokri† , Carmela Troncoso‡ , Claudia Diaz‡ , Julien Freudiger† , and Jean-Pierre Hubaux† ‡ †

      Unraveling an Old Cloak: k-anonymity for Location Privacy Reza Shokri† , Carmela Troncoso‡ , Claudia Diaz‡ , Julien Freudiger† , and Jean-Pierre Hubaux† ‡ †

      Add to Reading List

      Source URL: www.shokri.org

      Language: English - Date: 2015-05-28 18:54:40
        8L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; ACHIEVING k-ANONYMITY PRIVACY

        L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; ACHIEVING k-ANONYMITY PRIVACY

        Add to Reading List

        Source URL: dataprivacylab.org

        Language: English - Date: 2013-10-01 06:58:18
          9On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

          On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2006-10-10 13:39:42