Some basics on privacy techniques, anonymization and their big data challenges
From MaRDI portal
Publication:1616158
DOI10.1007/s11786-018-0344-6zbMath1432.68136OpenAlexW2809577165MaRDI QIDQ1616158
Josep Domingo-Ferrer, Julián Salas
Publication date: 1 November 2018
Published in: Mathematics in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11786-018-0344-6
privacy enhancing technologiesdifferential privacybig data privacycontrol \(k\)-anonymityprivacy by design statistical disclosure
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computational aspects of data analysis and big data (68T09) Privacy of data (68P27)
Cites Work
- Unnamed Item
- Unnamed Item
- Improving the characterization of P-stability for applications in network privacy
- Secure data management in decentralized systems
- Disclosure risk assessment in statistical data protection.
- Graphic sequences, distances and \(k\)-degree anonymity
- Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs
- Differentially private data analysis of social networks via restricted sensitivity
- Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy
- How to share a secret
- Private information retrieval
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A method for obtaining digital signatures and public-key cryptosystems
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
- Analyzing Graphs with Node Differential Privacy
- Fully homomorphic encryption using ideal lattices
- Advances in Cryptology - EUROCRYPT 2004
- Theory of Cryptography