Author:
Zheleva Elena,Getoor Lise
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonimity. Journal of Privacy Technology (November 2005)
2. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x: Anonymized social networks, hidden patterns, and structural steganography. In: 16th International Conference on World Wide Web (WWW), pp. 181–190 (2007)
3. Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: IEEE 21st International Conference on Data Engineering (April 2005)
4. Chawla, S., Dwork, C., Mcsherry, F., Smith, A., Wee, H.: Toward privacy in public databases. In: Proceedings of the Theory of Cryptography Conference (2005)
5. Evfimievski, A., Gehrke, J., Srikant., R.: Limiting privacy breaches in privacy preserving data mining. In: ACM Principles of database systems (PODS), pp. 211–222 (June 2003)
Cited by
98 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献