k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
From MaRDI portal
Recommendations
Cited in
(only showing first 100 items - show all)- The l-diversity problem: tractability and approximability
- On environment-driven software model for internetware
- Parameterized complexity of \(k\)-anonymity: hardness and tractability
- Lossy kernelization of same-size clustering
- A unified framework for clustering constrained data without locality property
- Probability comprehension of differential privacy for privacy protection algorithms: a new measure
- A firm foundation for statistical disclosure control
- The effect of homogeneity on the computational complexity of combinatorial data anonymization
- Generalized bucketization scheme for flexible privacy settings
- A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
- Publishing anonymous survey rating data
- A formal analysis of information disclosure in data exchange
- Integrating Ethics into the Guidelines for Assessment and Instruction in Statistics Education (GAISE)
- Tools for protecting the privacy of specific individuals in video
- A polynomial-time approximation to optimal multivariate microaggregation
- A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database
- Private Sampling: A Noiseless Approach for Generating Differentially Private Synthetic Data
- Privacy in elections: \(k\)-anonymizing preference orders
- Some basics on privacy techniques, anonymization and their big data challenges
- Pattern-guided \(k\)-anonymity
- A relational perspective of attribute reduction in rough set-based data analysis
- Protean Signature Schemes
- A practical approximation algorithm for optimal \(k\)-anonymity
- Statistics and the modern student
- Disclosure control of business microdata: a density-based approach
- 30 years of synthetic data
- Sharing privacy protected and statistically sound clinical research data using outsourced data storage
- Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving
- Improving the characterization of P-stability for applications in network privacy
- Approximating degree sequences with regular graphic sequences (extended abstract)
- A generalized approach for social network integration and analysis with privacy preservation
- A general approach for optimizing dynamic sensor activation for discrete event systems
- Differential privacy of hierarchical census data: an optimization approach
- Privacy in Networks of Interacting Agents
- Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy
- Differentially private data publishing for arbitrarily partitioned data
- \(r\)-gathering problems on spiders: hardness, FPT algorithms, and PTASes
- Value versus damage of information release: a data privacy perspective
- Protecting data: a fuzzy approach
- Survey of information security
- Using patterns to form homogeneous teams
- Conditional anonymity with non-probabilistic adversary
- The effect of false positives: Why fuzzy message detection leads to fuzzy privacy guarantees?
- Mining probabilistic automata: a statistical view of sequential pattern mining
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION
- The effect of homogeneity on the complexity of \(k\)-anonymity
- Anonymizing categorical data with a recoding method based on semantic similarity
- (k, l)-Clustering for Transactional Data Streams Anonymization
- On the complexity of the minimum independent set partition problem
- An active global attack model for sensor source location privacy: analysis and countermeasures
- Protecting Data Privacy Through Hard-to-Reverse Negative Databases
- Towards privacy-preserving data mining in online social networks: distance-grained and item-grained differential privacy
- A weighted K-member clustering algorithm for K-anonymization
- Processing text for privacy: an information flow perspective
- PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS
- scientific article; zbMATH DE number 6860834 (Why is no real title available?)
- Quantification of integrity
- Differentially private distributed logistic regression with the objective function perturbation
- Adversarial machine learning for cybersecurity and computer vision: current developments and challenges
- A game-theoretic approach to indistinguishability of winning objectives as user privacy
- A dynamic anonymization privacy-preserving model based on hierarchical sequential three-way decisions
- A derivative-free algorithm for refining numerical microaggregation solutions
- Privacy-preserving parameter estimation in distributed cases
- Anonymous Data Collection System with Mediators
- A logical framework for privacy-preserving social network publication
- Generalization-based privacy preservation and discrimination prevention in data publishing and mining
- Preserving worker privacy in crowdsourcing
- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
- Anonymity protocols as noisy channels
- \(T\)-closeness slicing: a new privacy-preserving approach for transactional data publishing
- The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach
- Limiting disclosure of sensitive data in sequential releases of databases
- Importance partitioning in micro-aggregation
- Finding geometric facilities with location privacy
- Revisiting driver anonymity in ORide
- Sufficiency Revisited: Rethinking Statistical Algorithms in the Big Data Era
- FPT Approximation for Constrained Metric k-Median/Means
- Re‐identification in the Absence of Common Variables for Matching
- Efficient secure data publishing algorithms for supporting information sharing
- Strongly universally consistent nonparametric regression and classification with privatised data
- DNA-inspired information concealing: a survey
- Privacy-preserving and lossless distributed estimation of high-dimensional generalized additive mixed models
- Extended results on privacy against coalitions of users in user-private information retrieval protocols
- Polymorphic encryption and pseudonymisation in identity management and medical research
- Effective privacy preserving data publishing by vectorization
- Differentially private response mechanisms on categorical data
- Community structure-based trilateral Stackelberg game model for privacy protection
- Using \(k\)-anonymization for registry data: pitfalls and alternatives
- Improving Microaggregation for Complex Record Anonymization
- Towards the evaluation of time series protection methods
- Logical foundations of information disclosure in ontology-based data integration
- \(k\)-attribute-anonymity is hard even for \(k=2\)
- Analysis of the univariate microaggregation disclosure risk
- Efficient systematic clustering method for k-anonymization
- Inference-proof updating of a weakened view under the modification of input parameters
- KDVEM: a \(k\)-degree anonymity with vertex and edge modification algorithm
- Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations
- LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks
- Column generation bounds for numerical microaggregation
- On the properties that characterize privacy
This page was built for publication: k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4824634)