Privacy analytics
暂无分享,去创建一个
[1] B. Malin,et al. Anonymization of electronic medical records for validating genome-wide association studies , 2010, Proceedings of the National Academy of Sciences.
[2] Tyrone Grandison,et al. Compliance with data protection laws using Hippocratic Database active enforcement and auditing , 2007, IBM Syst. J..
[3] Balachander Krishnamurthy,et al. For sale : your data: by : you , 2011, HotNets-X.
[4] Graham Greenleaf,et al. Global Data Privacy in a Networked World , 2011 .
[5] Avanidhar Subrahmanyam,et al. The Value of Private Information , 2005 .
[6] Mischa Schwartz,et al. ACM SIGCOMM computer communication review , 2001, CCRV.
[7] Douwe Korff,et al. Using NHS Patient Data for Research Without Consent , 2010 .
[8] Sushil Jajodia,et al. Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.
[9] Jules Polonetsky,et al. To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising , 2011 .
[10] Adam J. Lee,et al. Secured histories: computing group statistics on encrypted data while preserving individual privacy , 2010, ArXiv.
[11] Jon Crowcroft,et al. The case for crowd computing , 2010, MobiHeld '10.
[12] Anne Adams,et al. Privacy in Multimedia Communications: Protecting Users, Not Just Data , 2001, BCS HCI/IHM.
[13] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[14] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[15] Jon Crowcroft,et al. EpiMap: towards quantifying contact networks and modelling the spread of infections in developing countries , 2011, ACWR '11.
[16] Saikat Guha,et al. Serving Ads from localhost for Performance, Privacy, and Profit , 2009, HotNets.
[17] Aaron Roth,et al. Selling privacy at auction , 2010, EC '11.
[18] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[19] George Danezis,et al. Privacy-preserving smart metering , 2011, ISSE.
[20] Derek McAuley,et al. The Dataware manifesto , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[21] Ian Brown,et al. Security against compelled disclosure , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[22] Hamed Haddadi,et al. MobiAd: private and scalable mobile advertising , 2010, MobiArch '10.
[23] Carmela Troncoso,et al. On the Impact of Social Network Profiling on Anonymity , 2008, Privacy Enhancing Technologies.
[24] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[25] Ratul Mahajan,et al. Differentially-private network trace analysis , 2010, SIGCOMM '10.