1. C. Adams, Achieving non-transferability in credential systems using hidden biometrics. Secur. Commun. Netw. 4(2), 195–206 (2011, Feb)
2. C. Aggarwal, On k-anonymity and the curse of dimensionality, in Proceedings of the 31st Conference on Very Large Databases, (Trondheim, Norway, 2005, Aug), pp. 901–909
3. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in Proceedings of the International Conference on Database Theory, (Springer LNCS 3363, 2005, Jan 5–7), pp. 246–258
4. J. Ali, Validating Leaked Passwords with k-Anonymity. Cloudfare blog (2018)
5. O. Angiuli, J. Waldo, Statistical tradeoffs between generalization and suppression in the de-identification of large-scale data sets, in IEEE 40th Annual Computer Software and Applications Conference, (2016), pp. 589–593