1. Cohen, A.: Attacks on Deidentification's Defenses. In: 31st, USENIX Security Symposium (USENIX Security 2022), pp. 1469–1486 (2022)
2. De Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)
3. Dhondt, K., et al.: A run a day won't keep the hacker away: inference attacks on end-point privacy zones in fitness tracking social networks. In: CCS 2022: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 801–814 (2021)
4. Esayas, S.Y.: The role of anonymisation and pseudonymisation under the EU data privacy rules: beyond the ‘all or nothing’ approach. Eur. J. Law Technol. 6(2), 19 (2015)
5. Finck, M., Pallas, F.: They who must not be identified—distinguishing personal from non-personal data under the GDPR. Int. Data Priv. Law 10(1), 35 (2020)