1. Allard, T., Nguyen, B., Pucheral, P.: k-anonymizing data hosted in smart tokens with a weakly-malicious publisher. Technical report 2011/27, PRISM Laboratory (2011)
2. Barnett, V., Lewis, T.: Outliers in statistical data, 3rd edn. Wiley, Chichester (1994)
3. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4) (2010)
4. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229. ACM, New York (1987)
5. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: Özcan, F. (ed.) SIGMOD Conference, pp. 49–60. ACM, New York (2005)