Author:
Bisdikian Chatschik,Gibson Christopher,Chakraborty Supriyo,Srivastava Mani B.,Sensoy Murat,Norman Timothy J.
Subject
Software,Computer Science Applications,Hardware and Architecture,Computer Networks and Communications,Information Systems
Reference49 articles.
1. Data obfuscation: anonymity and desensitization of usable data sets;Bakken;IEEE Security and Privacy,2004
2. D. Agrawal, C.C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, in: 20th ACM SIGMOD-SIGACT-SIGART Symp. on Principles of Database Systems, PODS’01, Santa Barbara, CA, USA, May 21–24, 2001.
3. M. Duckham, L. Kulik, A formal model of obfuscation and negotiation for location privacy, in: 3rd Int’l Conf. on Pervasive Computing, PERVASIVE 2005, Munich, Germany, May 8–13, 2005.
4. Access control to people location information;Hengartner;ACM Transactions on Information and System Security,2005
5. The Internet of Things;Gershenfeld;Scientific American,2004
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献