|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
208 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 37-38, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
107 | Vitaly Shmatikov, Ming-Hsiu Wang |
Measuring relationship anonymity in mix networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 59-62, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, anonymity, mix networks |
102 | Agusti Solanas, Francesc Sebé, Josep Domingo-Ferrer |
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 61-69, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
p-sensitive k-anonymity, micro-data protection, privacy, k-anonymity |
98 | Brijesh Kumar Chaurasia, Shekhar Verma |
Maximizing anonymity of a vehicle through pseudonym updation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, Hawaii, USA, November 17-19, 2008, pp. 83, 2008, ICST, 978-963-9799-36-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
anonymity set (key words), anonymity, vehicular networks, pseudonyms |
91 | Jian-min Han, Huiqun Yu, Yu Juan, Ting-ting Cen |
A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 318-323, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
(a, k)-Anonymity Model, Homogeneity Attack, K-anonymity, l-Diversity |
89 | Xiaoxin Wu 0001, Jun Liu 0009, Xiaoyan Hong, Elisa Bertino |
Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 461-472, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
84 | Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shariat Panahi, Zahra Nasr Azadani |
Toward a software development methodology for anonymity applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anonymity application, anonymity, software development methodology |
82 | Ik Rae Jeong, Dong Hoon Lee 0001 |
Anonymity Control in Multi-bank E-Cash System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 104-116, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
77 | Xiaoxin Wu 0001, Jun Liu 0009, Xiaoyan Hong, Elisa Bertino |
Anonymous Geo-Forwarding in MANETs through Location Cloaking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(10), pp. 1297-1309, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
77 | Traian Marius Truta, Alina Campan, Paul Meyer |
Generating Microdata with P -Sensitive K -Anonymity Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 124-141, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
p-sensitive k-anonymity, attribute disclosure, Privacy, k-anonymity |
75 | Souvik Ray, Giora Slutzki, Zhao Zhang |
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 2007 International Conference on Parallel Processing (ICPP 2007), September 10-14, 2007, Xi-An, China, pp. 63, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Giuseppe Ciaccio |
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 190-207, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Toby Xu, Ying Cai |
Location anonymity in continuous location-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 15th ACM International Symposium on Geographic Information Systems, ACM-GIS 2007, November 7-9, 2007, Seattle, Washington, USA, Proceedings, pp. 39, 2007, ACM, 978-1-59593-914-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
continuous location updates, location-based services, location anonymity |
72 | Maurizio Atzori |
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 60-71, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
low distortion, k-anonymity, data privacy |
72 | Feng Bao 0001, Robert H. Deng |
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 1-11, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
e-commerce, traceability, blinding signatures, anonymity revocation |
72 | Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham |
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 136-148, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity set (key words), Anonymity, vehicular networks, pseudonyms |
70 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang 0001 |
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 754-759, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, anonymity, privacy preservation, data publishing |
70 | Ye Zhu 0001, Riccardo Bettati |
Anonymity vs. Information Leakage in Anonymity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA, pp. 514-524, 2005, IEEE Computer Society, 0-7695-2331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Anonymity, Covert Channels, Mix Networks |
68 | Dogan Kesdogan, Dakshi Agrawal, Stefan Penz |
Limits of Anonymity in Open Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 53-69, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
67 | Amirreza Masoumzadeh 0001, James Joshi, Hassan A. Karimi |
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings, pp. 464-467, 2009, ACM, 978-1-60558-649-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, anonymity, LBS, k-anonymity |
66 | Liang Wang, Yajun Guo, Huifang Yan |
A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 254-257, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Bo Zhu, Sanjeev Setia, Sushil Jajodia |
Providing witness anonymity in peer-to-peer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 6-16, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication |
65 | Csilla Farkas, Gábor Ziegler, Attila Meretei, András Lörincz |
Anonymity and accountability in self-organizing electronic communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 81-90, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
self-organizing community, privacy, authentication, anonymity, accountability |
64 | Andreas Pfitzmann, Marit Köhntopp |
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 1-9, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
63 | Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr |
Towards an Analysis of Onion Routing Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 96-114, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Security, privacy, anonymity, traffic analysis |
63 | Xiaoxin Wu 0001, Elisa Bertino |
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(4), pp. 252-265, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy analysis, Anonymous communication, ad hoc routing protocols |
61 | Chih-Hua Tai, Philip S. Yu, Ming-Syan Chen |
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 473-482, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, outsourcing, frequent itemsets |
61 | Lijie Zhang, Weining Zhang |
Edge Anonymity in Social Network Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 1-8, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Xiaoxun Sun, Hua Wang 0002, Jiuyong Li |
On the Complexity of Restricted k-anonymity Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings, pp. 287-296, 2008, Springer, 978-3-540-78848-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Ichiro Hasuo, Yoshinobu Kawabe |
Probabilistic Anonymity Via Coalgebraic Simulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 16th European Symposium on Programming, ESOP 2007, Held as Part of the Joint European Conferences on Theory and Practics of Software, ETAPS 2007, Braga, Portugal, March 24 - April 1, 2007, Proceedings, pp. 379-394, 2007, Springer, 978-3-540-71314-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach |
Fundamental Limits on the Anonymity Provided by the MIX Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 86-99, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Joseph Y. Halpern, Kevin R. O'Neill |
Anonymity and Information Hiding in Multiagent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 75-88, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Andrei Serjantov, George Danezis |
Towards an Information Theoretic Metric for Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 41-53, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
61 | Alain Pinsonneault, Nelson Heppel |
Anonymity In Group Support Systems Research: New Conceptualization And Measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (2) ![In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pp. 134-, 1997, IEEE Computer Society, 0-8186-7734-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
59 | Oliver Berthold, Andreas Pfitzmann, Ronny Standtke |
The Disadvantages of Free MIX Routes and how to Overcome Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 30-45, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Roger Dingledine, Michael J. Freedman, David Molnar |
The Free Haven Project: Distributed Anonymous Storage Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 67-95, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
58 | Laila El Aimani |
Anonymity from Public Key Encryption to Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 217-234, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction |
58 | Bugra Gedik, Ling Liu 0001 |
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 7(1), pp. 1-18, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Location Privacy, k-anonymity, Mobile Computing Systems, Location-based Applications |
58 | Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi |
Anonymity preserving pattern discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 17(4), pp. 703-727, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Individual privacy, anonymity, Knowledge discovery, Privacy preserving data mining, Frequent pattern mining |
58 | Slava Kisilevich, Yuval Elovici, Bracha Shapira, Lior Rokach |
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 63-81, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
suppression, data mining, anonymity, generalization, privacy preserving |
58 | Wei Wang 0002, Mehul Motani, Vikram Srinivasan |
Dependent link padding algorithms for low latency anonymity systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 323-332, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymity systems, link padding, traffic analysis attack |
58 | Nicholas Hopper, Eugene Y. Vasserman |
On the effectiveness of k;-anonymity against traffic analysis and surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 9-18, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k, mass surveillance, anonymity, statistical disclosure |
58 | Sebastian Clauß, Stefan Schiffner |
Structuring anonymity metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 55-62, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymity metrics, privacy metrics, identity management |
58 | Wei Jiang, Chris Clifton |
Privacy-Preserving Distributed k-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 166-177, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, k-anonymity |
58 | Ryotaro Hayashi 0001, Keisuke Tanaka |
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 216-233, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
undeniable and confirmer signature, anonymity, encryption, RSA, ring signature |
58 | Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 |
Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 829-840, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Peer-to-peer (P2P) systems, mutual anonymity, overlay networks, communication protocols, Internet systems |
58 | Steven D. Galbraith, Wenbo Mao |
Invisibility and Anonymity of Undeniable and Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 80-97, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility |
58 | Marc Rennhard, Bernhard Plattner, Sandro Rafaeli, Laurent Mathy, David Hutchison 0001 |
An Architecture for an Anonymity Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 165-170, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
anonymous Web browsing, Anonymity, pseudonymity, mix-networks |
55 | Jian Ren 0001 |
Privacy-Preserving Communication Algorithms and Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings, pp. 515-525, 2008, Springer, 978-3-540-88581-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity |
54 | Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias |
Providing anonymity services in SIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Osman Abul, Francesco Bonchi, Mirco Nanni |
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 376-385, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Guihua Duan, Weiping Wang 0003, Jianxin Wang 0001, Luming Yang |
A New Anonymity Measure Based on Partial Entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1484-1488, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Sébastien Canard, Aline Gouget |
Anonymity in Transferable E-cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 207-223, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Seil Kim, Ji Young Chun, Dong Hoon Lee 0001 |
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2235-2239, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Jinyuan Sun, Chi Zhang 0001, Yuguang Fang |
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1687-1695, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | George Danezis, Len Sassaman |
How to Bypass Two Anonymity Revocation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 187-201, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Xin Chen, Huaping Hu, Bo Liu 0014, Fengtao Xiao, Zunguo Huang |
ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 251-256, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Jan Friso Groote, Simona Orzan |
Parameterised Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 177-191, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Sachin Lodha, Dilys Thomas |
Probabilistic Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers, pp. 56-79, 2007, Springer, 978-3-540-78477-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Tom Chothia, Simona Orzan, Jun Pang 0001, Muhammad Torabi Dashti |
A Framework for Automatically Checking Anonymity with mu CRL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers, pp. 301-318, 2006, Springer, 978-3-540-75333-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Souvik Ray, Zhao Zhang 0010 |
An Efficient Anonymity Protocol for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 5th International Workshop on Grid Computing (GRID 2004), 8 November 2004, Pittsburgh, PA, USA, Proceedings, pp. 200-207, 2004, IEEE Computer Society, 0-7695-2256-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Dogan Kesdogan, Jan Egner, Roland Büschkes |
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 83-98, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
53 | Arik Friedman, Assaf Schuster, Ran Wolff 0001 |
k-Anonymous Decision Tree Induction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKDD ![In: Knowledge Discovery in Databases: PKDD 2006, 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22, 2006, Proceedings, pp. 151-162, 2006, Springer, 3-540-45374-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
decision trees, k-anonymity, privacy preserving data mining |
52 | Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong |
Freenet: A Distributed Anonymous Information Storage and Retrieval System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 46-66, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Joachim Biskup, Ulrich Flegel |
On Pseudonymization of Audit Data for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 161-180, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Oliver Berthold, Hannes Federrath, Stefan Köpsell |
Web MIXes: A System for Anonymous and Unobservable Internet Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 115-129, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
51 | Han Chen, Pasquale Malacaria |
Quantifying maximal loss of anonymity in protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 206-217, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, quantitative analysis, Lagrange multipliers |
51 | Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins |
A survey of state-of-the-art in anonymity metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 31-40, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network data, privacy, metrics, anonymity, communication networks |
51 | Josep Domingo-Ferrer, Vicenç Torra |
A Critique of k-Anonymity and Some of Its Enhancements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 990-993, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
t-Closeness, k-Anonymity, l-Diversity, Database privacy |
51 | Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni |
Anonymity Scheme for Interactive P2P Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 33-40, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Distributed Hash Table (DHT), Peer-to-Peer (P2P), Low-latency, Interactive Services |
51 | Lanlan Hu, Yixian Yang, Xinxin Niu |
Improved Remote User Authentication Scheme Preserving User Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada, pp. 323-328, 2007, IEEE Computer Society, 0-7695-2835-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymity, Smart cards |
51 | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini |
Achieving Mobility and Anonymity in IP-Based Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 60-79, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mobility, anonymity, Mobile IP, location privacy, IP networks, Tor |
51 | Justin Brickell, Vitaly Shmatikov |
Efficient anonymity-preserving data collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 76-85, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity |
51 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 114-125, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange |
51 | Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao 0001, Robert H. Deng, M. U. Siddiqi |
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 369-382, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Anonymity, Watermarking, Fingerprinting, Copyright Protection, Traitor Tracing |
51 | Padmal Vitharana, Keshavamurthy Ramamurthy |
Computer-Mediated Group Support, Anonymity, and the Software Inspection Process: An Empirical Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 29(2), pp. 167-180, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
controlled experiment design, seeded errors, Anonymity, software inspection, group support systems, software quality assurance |
51 | Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, David Hutchison 0001 |
Analysis of an Anonymity Network for Web Browsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 49-54, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anonymous web browsing, anonymity, MIX networks |
51 | Jan Camenisch, Ueli M. Maurer, Markus Stadler |
Digital Payment Systems with Passive Anonymity-Revoking Trustees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 33-43, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Digital payment systems, privacy, cryptography, anonymity revocation, electronic money |
49 | Zhen Xiao, Xiaofeng Meng 0001, Jianliang Xu |
Quality Aware Privacy Protection for Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 434-446, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
QoS, Privacy, Location-based Services |
49 | Pierangela Samarati |
Protecting Respondents' Identities in Microdata Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 13(6), pp. 1010-1027, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
49 | David Pointcheval |
Self-Scrambling Anonymizers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 259-275, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Dakshi Agrawal, Dogan Kesdogan |
Measuring Anonymity: The Disclosure Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 27-34, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
evaluation and measurement of anonymity, anonymity, traffic analysis |
47 | Ye Zhu 0001, Riccardo Bettati |
Information Leakage as a Model for Quality of Anonymity Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 20(4), pp. 540-552, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns |
Persona: Network Layer Anonymity and Accountability for Next Generation Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 410-420, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Brijesh Kumar Chaurasia, Shekhar Verma |
Optimizing Pseudonym Updation for Anonymity in VANETS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1633-1637, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Josep Domingo-Ferrer, Francesc Sebé, Agusti Solanas |
An Anonymity Model Achievable Via Microaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 209-218, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, statistical disclosure control, statistical databases, Microaggregation, microdata protection |
47 | Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, Shengzhi Li, Xun Lin, Jie Zuo |
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 697-701, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Shenkun Xu, Xiaojun Ye |
Risk & Distortion Based K-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 345-358, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Wen Ji, Shoubao Yang, Dong Wei 0015, Weina Lu |
GARM: A Group - Anonymity Reputation Model in Peer-to-Peer System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing, Sixth International Conference on Grid and Cooperative Computing, GCC 2007, August 16-18, 2007, Urumchi, Xinjiang, China, Proceedings, pp. 481-488, 2007, IEEE Computer Society, 0-7695-2871-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Jian Pei, Jian Xu 0015, Zhibin Wang, Wei Wang 0009, Ke Wang 0001 |
Maintaining K-Anonymity against Incremental Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: 19th International Conference on Scientific and Statistical Database Management, SSDBM 2007, 9-11 July 2007, Banff, Canada, Proceedings, pp. 5, 2007, IEEE Computer Society, 0-7695-2868-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei |
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, Krakow, Poland, September 4-8, 2006, Proceedings., pp. 405-416, 2006, Springer, 3-540-37736-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang 0001 |
(alpha, k)-anonymous data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Inf. Syst. ![In: J. Intell. Inf. Syst. 33(2), pp. 209-234, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data mining, Privacy, Anonymity, Privacy preservation, Data publishing |
46 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 276-292, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
46 | Parvathinathan Venkitasubramaniam, Lang Tong |
Anonymous Networking with Minimum Latency in Multihop Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 18-32, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network Security, Anonymity, Traffic Analysis, Rate-Distortion |
46 | Jie Tang 0001, Juan-Zi Li, Kehong Wang, Yue-Ru Cai |
Research of Atomic and Anonymous Electronic Commerce Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSFDGrC ![In: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, 9th International Conference, RSFDGrC 2003, Chongqing, China, May 26-29, 2003, Proceedings, pp. 711-714, 2003, Springer, 3-540-14040-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fair blind signature, fair anonymity, atomicity, payment system |
45 | Hannes Federrath (eds.) |
Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Workshop on Design Issues in Anonymity and Unobservability ![Springer, 3-540-41724-9 The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Jean-François Raymond |
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 10-29, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | John J. Borking |
Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 130-140, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Oliver Berthold, Marit Köhntopp |
Identity Management Based on P3P. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 141-160, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Giovanni Iachello, Kai Rannenberg |
Protection Profiles for Remailer Mixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 181-230, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3902 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|