Author:
Kunz Immanuel,Banse Christian,Stephanow Philipp
Publisher
Springer International Publishing
Reference27 articles.
1. Birnstill, P., Ren, D., Beyerer, J.: A user study on anonymization techniques for smart video surveillance. In: 12th International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6. IEEE (2015)
2. Dalenius, T.: Finding a needle in a haystack or identifying anonymous census records. J. Off. Stat. 2(3), 329 (1986)
3. Lecture Notes in Computer Science;RA Dandekar,2002
4. De Wolf, P.P., Gouweleeuw, J., Kooiman, P., Willenborg, L., et al.: Reflections on PRAM. In: Statistical Data Protection, pp. 337–349. Citeseer (1998)
5. Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1), 3–32 (2011). https://doi.org/10.1007/s00766-010-0115-7
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献