K-anonymity

Results: 35



#Item
11

The Effect of Homogeneity on the Complexity of k-Anonymity Robert Bredereck1,? , André Nichterlein1 , Rolf Niedermeier1 , Geevarghese Philip2 1

Add to Reading List

Source URL: fpt.akt.tu-berlin.de

Language: English - Date: 2011-06-21 09:15:37
    12Ethics / Data management / Mathematical notation / Tuple / Type theory / Relation / Anonymity / Data mining / Finitary relation / Mathematics / Relational model / Data

    The VLDB Journal manuscript No. (will be inserted by the editor) Providing k-Anonymity in Data Mining? Arik Friedman, Ran Wolff, Assaf Schuster Technion – Israel Institute of Technology

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2006-09-27 11:51:39
    13

    Need to Preserve Privacy k-Anonymity and `- . . . Statistical DataIn Statistical DataData Anonymization that

    Add to Reading List

    Source URL: www.cs.utep.edu

    Language: English - Date: 2013-05-16 15:33:11
      14Matrix / Heuristic function / Euclidean vector / Greedy algorithm / Algebra / Mathematics / Linear algebra

      Pattern-Guided k-Anonymity Robert Bredereck? , André Nichterlein, and Rolf Niedermeier Institut für Softwaretechnik und Theoretische Informatik, TU Berlin, Berlin, Germany {robert.bredereck,andre.nichterlein,rolf.niede

      Add to Reading List

      Source URL: fpt.akt.tu-berlin.de

      Language: English - Date: 2013-04-15 08:20:00
      15Matrix / Euclidean vector / Rank / Euclidean subspace / Algebra / Mathematics / Linear algebra

      Pattern-Guided k-Anonymity

      Add to Reading List

      Source URL: fpt.akt.tu-berlin.de

      Language: English - Date: 2013-10-21 04:21:43
      16Information retrieval / Data mining / Multivariate statistics / Stylometry / Cluster analysis / K-means clustering / Search engine indexing / HTML / Anonymity / Statistics / Information science / Science

      Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization Andrew W.E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman, and Rachel Greenstadt Drexel University, Philadelphia, PA {awm32,sa499,ac9

      Add to Reading List

      Source URL: www.cs.drexel.edu

      Language: English - Date: 2012-11-30 19:10:23
      17NP-complete problems / Graph partition / Graph / Matching / Hypergraph / Domatic number / Graph theory / Theoretical computer science / Mathematics

      Microsoft PowerPoint - K-Anonymity.ppt

      Add to Reading List

      Source URL: www.andrew.cmu.edu

      Language: English - Date: 2012-08-22 17:30:01
      18Crowds / Onion routing / Cryptographic protocols / Communications protocol / Public-key cryptography / Anonymity / IP / XTR / Cryptography / Internet privacy / Commitment scheme

      k -Anonymous Message Transmission Luis von Ahn Andrew Bortz Nicholas J. Hopper Computer Science Department Carnegie Mellon University {biglou,abortz,hopper}@cs.cmu.edu August 29, 2003

      Add to Reading List

      Source URL: abortz.net

      Language: English - Date: 2010-06-18 14:05:16
      19Tobacco control / United States Bill of Rights / Parliament of Singapore / Politics / Government / Ethics / Criminal Evidence (Witness Anonymity) Act / IDEA Fairness Restoration Act / Public health / Smoking / Smoking ban

      19, 20, 21 AUGUST[removed]Debates w e e k ly h a n s a r d s e v e n t h a s s e M B ly

      Add to Reading List

      Source URL: www.hansard.act.gov.au

      Language: English - Date: 2011-09-07 22:48:43
      20Collaborative fiction / Anonymity / Medical privacy / Privacy / Ethics / Industry Canada / Social Sciences and Humanities Research Council

      about this book This book derives from the Social Science and Humanities Research Council (SSHRC) Initiative on the New Economy. Recognizing that the increased speed of technological development and the rapid growth of k

      Add to Reading List

      Source URL: idtrail.org

      Language: English - Date: 2009-04-03 20:03:01
      UPDATE