1. Lecture Notes in Computer Science;L. Cleveland,2012
2. Lecture Notes in Computer Science;M. Elliot,2010
3. Elliot, M., Dale, A.: Scenarios of attack: the data intruder’s perspective on statistical disclosure risk. Netherlands Official Statistics 14, 6–10 (1999)
4. Domingo-Ferrer, J., Torra, V.: A critique of k-anonymity and some of its enhancements. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 990–993 (2008),
http://ieeexplore.ieee.org/xpls/abs_all.jsp?rnumber=4529451
(accessed July 14, 2012)
5. Wiley Series in Survey Methodology;A. Hundepool,2012