Computational data privacy in wireless networks
暂无分享,去创建一个
[1] R. Gray. Entropy and Information Theory , 1990, Springer New York.
[2] Charles Elkan,et al. Differential privacy based on importance weighting , 2013, Machine Learning.
[3] Ljiljana Brankovic,et al. Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk , 2014, IWOCA.
[4] Justin Zhijun Zhan,et al. Quantifying Privacy for Privacy Preserving Data Mining , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.
[5] Snehal M. Kamlapur,et al. Privacy preserving techniques for storage privacy attacks: A survey , 2012, 2012 12th International Conference on Hybrid Intelligent Systems (HIS).
[6] Vittorio Scarano,et al. Privacy leakage on the Web: Diffusion and countermeasures , 2013, Comput. Networks.
[7] Wanlei Zhou,et al. Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[9] Qingshui Li,et al. An Improved Association Rule Privacy Protection Algorithm Research , 2012, ICICA.
[10] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[11] David W. Chadwick,et al. A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..
[12] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[13] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[14] Reihaneh Safavi-Naini,et al. A practice-oriented framework for measuring privacy and utility in data sanitization systems , 2010, EDBT '10.
[15] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[16] Jinjun Chen,et al. A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[17] David Sánchez,et al. A semantic framework to protect the privacy of electronic health records with non-numerical attributes , 2013, J. Biomed. Informatics.
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[20] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[21] A. W. Roscoe,et al. User interactive Internet of things privacy preserved access control , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[22] Liehuang Zhu,et al. LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.
[23] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[24] Elisa Bertino,et al. A Survey of Quantification of Privacy Preserving Data Mining Algorithms , 2008, Privacy-Preserving Data Mining.