Pages that link to "Item:Q4824634"
From MaRDI portal
The following pages link to k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY (Q4824634):
Displaying 50 items.
- Differentially private data publishing for arbitrarily partitioned data (Q2123557) (← links)
- The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach (Q2145387) (← links)
- Inference-proof updating of a weakened view under the modification of input parameters (Q2167727) (← links)
- On the properties that characterize privacy (Q2173173) (← links)
- An algebraic theory for data linkage (Q2185883) (← links)
- Enhancing social network privacy with accumulated non-zero prior knowledge (Q2195318) (← links)
- \(r\)-gathering problems on spiders: hardness, FPT algorithms, and PTASes (Q2232242) (← links)
- Differential privacy of hierarchical Census data: an optimization approach (Q2238578) (← links)
- A weighted K-member clustering algorithm for K-anonymization (Q2244050) (← links)
- Efficient secure data publishing algorithms for supporting information sharing (Q2267094) (← links)
- Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations (Q2278100) (← links)
- A general approach for optimizing dynamic sensor activation for discrete event systems (Q2280709) (← links)
- Achieving differential privacy of trajectory data publishing in participatory sensing (Q2293161) (← links)
- A unified framework for clustering constrained data without locality property (Q2300724) (← links)
- A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database (Q2333930) (← links)
- Sharing privacy protected and statistically sound clinical research data using outsourced data storage (Q2336386) (← links)
- Graphic sequences, distances and \(k\)-degree anonymity (Q2345626) (← links)
- Using patterns to form homogeneous teams (Q2346970) (← links)
- A refined complexity analysis of degree anonymization in graphs (Q2347809) (← links)
- Survey of information security (Q2385398) (← links)
- Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs (Q2392556) (← links)
- Prophet: a context-aware location privacy-preserving scheme in location sharing service (Q2398789) (← links)
- CDPS: a cryptographic data publishing system (Q2402351) (← links)
- Fuzzy microaggregation for the transparency principle (Q2410503) (← links)
- A polynomial-time approximation to optimal multivariate microaggregation (Q2426893) (← links)
- The effect of homogeneity on the computational complexity of combinatorial data anonymization (Q2435706) (← links)
- A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud (Q2442171) (← links)
- A logical framework for privacy-preserving social network publication (Q2447175) (← links)
- Linear spaces and transversal designs: \(k\)-anonymous combinatorial configurations for anonymous database search notes (Q2448091) (← links)
- Anonymity protocols as noisy channels (Q2482451) (← links)
- Effective privacy preserving data publishing by vectorization (Q2663502) (← links)
- Vine copula statistical disclosure control for mixed-type data (Q2674512) (← links)
- Tight FPT approximation for constrained \(k\)-center and \(k\)-supplier (Q2699973) (← links)
- A derivative-free algorithm for refining numerical microaggregation solutions (Q2794680) (← links)
- Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy (Q2817460) (← links)
- ON THE USE OF HAAR WAVELET TRANSFORM AND SCALING DATA PERTURBATION FOR PRIVACY PRESERVING CLUSTERING OF LARGE DATASETS (Q2891162) (← links)
- THE ANALYSIS OF SINGLETONS IN GENERALIZED BIRTHDAY PROBLEMS (Q2909827) (← links)
- Computing Covariance and Correlation in Optimally Privacy-Protected Statistical Databases: Feasible Algorithms (Q2940827) (← links)
- Anonymous Data Collection System with Mediators (Q2947112) (← links)
- Privacy in Elections: k-Anonymizing Preference Orders (Q2947888) (← links)
- A FORMALIZATION OF RECORD LINKAGE AND ITS APPLICATION TO DATA PROTECTION (Q2948290) (← links)
- Parameterized Complexity of k-Anonymity: Hardness and Tractability (Q3000512) (← links)
- The Effect of Homogeneity on the Complexity of k-Anonymity (Q3088269) (← links)
- PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS (Q3111214) (← links)
- On the Complexity of the Minimum Independent Set Partition Problem (Q3196378) (← links)
- Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks (Q3294793) (← links)
- Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm (Q3297543) (← links)
- Cryptographic Technology for Benefiting from Big Data (Q3454995) (← links)
- Improving Microaggregation for Complex Record Anonymization (Q3540958) (← links)
- An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures (Q3556630) (← links)