|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Jerome P. Reiter, Quanli Wang, Biyuan Zhang |
Bayesian Estimation of Disclosure Risks for Multiply Imputed, Synthetic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(1), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Nicole Crimi, William F. Eddy |
Top-Coding and Public Use Microdata Samples from the U.S. Census Bureau. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(2), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Alessandro Acquisti, Ralph Gross, Fred Stutzman |
Face Recognition and Privacy in the Age of Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(2), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Ilaria Liccardi, Joseph Pato, Daniel J. Weitzner |
Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(2), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Caroline Tudor, George Cornish, Keith Spicer |
Intruder Testing on the 2011 UK Census: Providing Practical Evidence for Disclosure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(2), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Dinusha Vatsalan, Peter Christen, Christine M. O'Keefe, Vassilios S. Verykios |
An Evaluation Framework for Privacy-Preserving Record Linkage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(1), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Frank Niedermeyer, Simone Steinmetzer, Martin Kroll, Rainer Schnell |
Cryptanalysis of Basic Bloom Filters Used for Privacy Preserving Record Linkage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(2), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Martin Klein 0006, Thomas Mathew, Bimal Sinha |
Noise Multiplication for Statistical Disclosure Control of Extreme Values in Log-normal Regression Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(1), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Duncan Smith, Mark J. Elliot |
A Graph-based Approach to Key Variable Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 6(2), 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rebecca S. Kraus |
Statistical Déjà Vu: The National Data Center Proposal of 1965 and Its Descendants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(1), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Yan-Xia Lin, Phillip Wise |
Estimation of Regression Parameters from Noise Multiplied Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Krishnaram Kenthapadi, Aleksandra Korolova, Ilya Mironov, Nina Mishra |
Privacy via the Johnson-Lindenstrauss Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(1), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Dan Kifer |
Introduction to Special Section. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(1), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert J. Hall 0002, Larry A. Wasserman, Alessandro Rinaldo |
Random Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Stephen E. Fienberg |
Is the Privacy of Network Data an Oxymoron? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Joo Ho Lee 0002, In Yong Kim, Christine M. O'Keefe |
On Regression-Tree-Based Synthetic Data Methods for Business Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(1), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Fred Stutzman, Ralph Gross, Alessandro Acquisti |
Silent Listeners: The Evolution of Privacy and Disclosure on Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | John M. Abowd, Matthew J. Schneider, Lars Vilhuber |
Differential Privacy Applications to Bayesian and Linear Mixed Model Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(1), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | |
Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Caroline Uhler, Aleksandra B. Slavkovic, Stephen E. Fienberg |
Privacy-Preserving Data Sharing for Genome-Wide Association Studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 5(1), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Yuval Nardi, Stephen E. Fienberg, Robert J. Hall 0002 |
Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Aleksandra B. Slavkovic, Adam D. Smith |
Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Xiaolin Yang, Stephen E. Fienberg, Alessandro Rinaldo |
Differential Privacy for Protecting Multi-dimensional Contingency Table Data: Extensions and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Christine M. O'Keefe, Ross Stewart Sparks, Damien McAullay, Bronwyn Loong |
Confidentialising Survival Analysis Output in a Remote Data Access System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Natalie Shlomo, Chris J. Skinner |
Privacy Protection from Sampling and Perturbation in Survey Microdata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Larry A. Wasserman |
Minimaxity, Statistical Thinking and Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Stephen E. Fienberg, Jiashun Jin |
Privacy-Preserving Data Sharing in High Dimensional Regression and Classification Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft |
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | David McClure 0003, Jerome P. Reiter |
Towards Providing Automated Feedback on the Quality of Inferences from Synthetic Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Kifer, Bing-Rong Lin |
An Axiomatic View of Statistical Privacy and Utility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 4(1), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Andrew C. Simpson |
On Privacy and Public Data: a Study of data.gov.uk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(1), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Yehuda Lindell |
Anonymous Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Martin M. Merener |
Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Gerald W. Gates |
Rejoinder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Aleksandra Korolova |
Privacy Violations Using Microtargeted Ads: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(1), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Julia Ingrid Lane |
A Dissenting View from Julia Lane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alan M. Zaslavsky |
Privacy and the Statistician: What Do We Need to Know to Certify Nondisclosure? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Anne-Sophie Charest |
How Can We Analyze Differentially-Private Synthetic Datasets? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Stephen E. Fienberg |
In This Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jerome P. Reiter |
Comment on Article by Gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Federal Trade Commission |
Protecting Consumer Privacy in an Era of Rapid Change - A Proposed Framework for Businesses and Policymakers (Preliminary FTC Staff Report). ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(1), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Stephen E. Fienberg |
Editorial: In This Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(1), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Vincent Toubiana, Helen Nissenbaum |
An Analysis of Google Logs Retention Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(1), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | George Duncan |
Commentary: Future U.S. National Statistics Use of Administrative Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | The Department of Commerce Internet Policy Task Force |
Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(1), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Stephen E. Fienberg |
In This Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Fritz J. Scheuren |
Trust but Pre-Verify? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Xiaodong Lin 0004, Alan F. Karr |
Privacy-preserving Maximum Likelihood Estimation for Distributed Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | James Waldo, Herbert S. Lin, Lynette I. Millett |
Engaging Privacy and Information Technology in a Digital Age: Executive Summary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Schneier |
Schneier on Security: Privacy and Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | James Waldo, Herbert S. Lin, Lawrence H. Cox |
Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age". ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | William J. Perry, Charles M. Vest |
Protecting Individual Privacy in the Struggle Against Terrorists—A Framework for Program Assessment: Executive Summary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Shubha U. Nabar, Nina Mishra |
Releasing Private Contingency Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Cynthia Dwork, Moni Naor |
On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Alan F. Karr |
Secure Statistical Analysis of Distributed Databases, Emphasizing What We Don't Know. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Natalie Shlomo |
Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jerome P. Reiter |
Multiple Imputation for Disclosure Limitation: Future Research Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Aleksandra B. Slavkovic |
Partial Information Releases for Confidential Contingency Table Entries: Present and Future Research Efforts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Stephen E. Fienberg |
Editorial: In This Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Cynthia Dwork, Adam D. Smith |
Differential Privacy for Statistics: What we Know and What we Want to Learn. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Lawrence H. Cox |
Vulnerability of Complementary Cell Suppression to Intruder Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | William J. Perry, Charles M. Vest |
The Science and Technology of Privacy Protection: Appendix L of "Protecting Individual Privacy in the Struggle Against Terrorists". ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | John M. Abowd, Kobbi Nissim, Chris J. Skinner |
First Issue Editorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jerome P. Reiter, Robin Mitra |
Estimating Risks of Identification Disclosure in Partially Synthetic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Margo J. Anderson, William Seltzer |
Rejoinder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Mi-Ja Woo, Jerome P. Reiter, Anna Oganian, Alan F. Karr |
Global Measures of Data Utility for Microdata Masked for Disclosure Limitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Charles L. Kincannon |
Comment on Article by Anderson and Seltzer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Yehuda Lindell, Benny Pinkas |
Secure Multiparty Computation for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Yongsang Song, Jongmoo Choi, Kyongho Han |
Multimodal Security Enhancement Scheme for Java Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 622-627, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Confidentiality, Java Card, PIN, Security-level |
15 | Shubhashis Sengupta, Vikrant S. Kaulgud, Vibhu Saujanya Sharma |
Cloud Computing Security-Trends and Research Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 524-531, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Security, Cloud Computing, Data integrity, Survey, confidentiality, Trusted Computing |
15 | Mohammad Reza Abbasy, Bharanidharan Shanmugam |
Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 385-390, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
DNA base pairing rules, complementary rules, DNA binary coding, Cloud Computing, Data hiding, DNA sequence, data confidentiality |
15 | Lu Fan, William J. Buchanan, Christoph Thümmler, Owen Lo, Abou Sofyane Khedim, Omair Uthmani, Alistair Lawson, Derek Bell |
DACAR Platform for eHealth Services Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 219-226, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Single Point of Contact, Information Sharing Policy Syntax, Data Buckets, Security, Confidentiality, Cloud, eHealth, Platform as a Service |
15 | Stephen Farrell |
Applications Directly Using Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 14(3), pp. 84-87, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
application layer crypto, object security, Internet, confidentiality |
15 | Sean Turner |
Secure/Multipurpose Internet Mail Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 14(5), pp. 82-86, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
S/MIME, message integrity, non-repudiation of origin, Internet, authentication, digital signatures, encryption, IETF, data confidentiality |
15 | Lein Harn, Changlu Lin |
Authenticated Group Key Transfer Protocol Based on Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 59(6), pp. 842-846, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Group key transfer protocol, authentication, secret sharing, confidentiality, session key |
15 | Wenjun Zhang 0001 |
Integrated Security Framework for Secure Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 178-183, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, web services, authentication, authorization, confidentiality |
15 | Joel Mana Gonçalves |
Privacy and Information Security in Brazil? Yes, We Have It and We Do It! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 702-707, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Integrity, Management, Policies, Availability, Certification, Confidentiality |
15 | Khan Ferdous Wahid |
Maximizing Ethernet Security by Switch-Based Single Secure Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 774-778, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
global confidentiality, global integrity, LAN security, MACsec, secure device identity |
15 | Debargh Acharya |
Security in Pervasive Health Care Networks: Current R&D and Future Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Data Management ![In: Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23-26 May 2010, pp. 305-306, 2010, IEEE Computer Society, 978-0-7695-4048-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Health care services, Electronic Health Record (EHR), security, privacy, confidentiality |
15 | Sardaouna Hamadou, Vladimiro Sassone, Catuscia Palamidessi |
Reconciling Belief and Vulnerability in Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 79-92, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
quantitative and probabilistic models, Security, uncertainty, information flow, accuracy, information hiding, vulnerability, belief, data confidentiality |
15 | Xiaotao Guo, Tian-Ge Zhuang |
A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 22(1), pp. 53-64, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, integrity, Watermarking, confidentiality, telemedicine, PACS, ROI, image authentication |
15 | Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral, Dennis E. Shasha |
Revelation on demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 25(1-2), pp. 5-28, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Confidentiality and privacy, Secure device, Indexing model, Query processing, Data warehousing, Aggregate computation |
15 | Nuno Amálio |
Suspicion-Driven Formal Analysis of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 217-223, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, planning, requirements, confidentiality, formal analysis, separation of duty, Event-Calculus |
15 | J. Nathan Foster, Benjamin C. Pierce, Steve Zdancewic |
Updatable Security Views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 60-74, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security views, integrity, information flow, confidentiality, view update, lenses, regular types |
15 | Max I. Kanovich, Paul D. Rowe, Andre Scedrov |
Policy Compliance in Collaborative Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 218-233, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Collaboration, Complexity, Policies, Confidentiality, Undecidability |
15 | Frank McSherry |
Privacy integrated queries: an extensible platform for privacy-preserving data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 19-30, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymization, confidentiality, differential privacy, linq |
15 | Amina Chaabane, Mohamed Jmaiel |
A Secure Content-Based Publish/Subscribe Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 619-622, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, publish/subscribe, confidentiality, content-based |
15 | Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sorin Lerner |
Staged information flow for javascript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, June 15-21, 2009, pp. 50-62, 2009, ACM, 978-1-60558-392-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity, web applications, confidentiality, flow analysis, set constraints |
15 | Alberto Jiménez Rozo |
Supply of accounting and financial information entities in charge of control surveillance: a proposal for the streamlining of procedures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009, pp. 396-399, 2009, ACM, 978-1-60558-663-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
customer-server, enterprise resources and software planning (ERP), government to business (G2B), internet data center (IDC), partnerships management and directors, remote surveillance/intervention, confidentiality, software as a service (SaaS), internal control |
15 | Fatemeh Saghafi, Fatemeh NasserEslami, Maryam Esmaili |
Ranking secure technologies in security provision financial transactions mobile commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 331-336, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
4c model, TOPSIS method, financial transactions, security challenges, ranking, confidentiality, mobile services, mobile commerce, security technologies |
15 | Luc Bouganim, François Dang Ngoc, Philippe Pucheral |
Dynamic access-control policies on XML encrypted data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(4), pp. 4:1-4:37, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ubiquitous data management, Access-control, smartcard, data confidentiality |
15 | Olalekan Adeyinka |
Internet Attack Methods and Internet Security Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 77-82, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus |
15 | Suhas Mathur, Wade Trappe, Narayan B. Mandayam, Chunxuan Ye, Alex Reznik |
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14-19, 2008, pp. 128-139, 2008, ACM, 978-1-60558-096-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PHY-layer security, confidentiality, key establishment, fading |
15 | Herbjørn Andresen |
The Policy Debate on Pseudonymous Health Registers in Norway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOSTEC (Selected Papers) ![In: Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2008, Funchal, Madeira, Portugal, January 28-31, 2008, Revised Selected Papers, pp. 413-424, 2008, Springer, 978-3-540-92218-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Public Health Policy, Privacy Regulation, Confidentiality, Data Security, Pseudonymity |
15 | Esmiralda Moradian |
Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III, pp. 771-778, 2008, Springer, 978-3-540-85566-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity, monitoring, intelligent agents, availability, Information security, confidentiality, meta-agents |
15 | Sherman S. M. Chow, Siu-Ming Yiu |
Timed-Release Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 38-51, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
release-time confidentiality, Timed-release encryption |
15 | Byran J. Smucker, Aleksandra B. Slavkovic |
Cell Bounds in Two-Way Contingency Tables Based on Conditional Frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 64-76, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Linear programming, Integer programming, Confidentiality, Statistical disclosure control, Contingency tables, Tabular data |
15 | Ludivine Crépin, Yves Demazeau, Olivier Boissier, François Jacquenet |
Sensitive Data Transaction in Hippocratic Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAW ![In: Engineering Societies in the Agents World IX, 9th International Workshop, ESAW 2008, Saint-Etienne, France, September 24-26, 2008, Revised Selected Papers, pp. 85-101, 2008, Springer, 978-3-642-02561-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Sensitive Data Transaction, Privacy, Multi-Agent Systems, Confidentiality, Interaction Protocol |
15 | Li Xiong 0001, Subramanyam Chitti, Ling Liu 0001 |
Preserving data privacy in outsourcing data aggregation services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 7(3), pp. 17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
classification, Privacy, confidentiality, outsourcing |
15 | Fouz Sattar, Muid Mufti |
On Modeling Post Decryption Error Processes in UMTS Air Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 507-516, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
3G Security, Wireless Confidentiality, UMTS Encryption, Markov Modeling, Error probability |
Displaying result #301 - #400 of 2507 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|