Incorporating Privacy into the Undergraduate Curriculum
暂无分享,去创建一个
Basit Shafiq | Jaideep Vaidya | David Lorenzi | Nazia Badar | Jaideep Vaidya | David Lorenzi | Basit Shafiq | Nazia Badar
[1] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[2] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[3] Язык программирования,et al. Cross Industry Standard Process for Data Mining , 2010 .
[4] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[5] Sandra Gorka,et al. Curriculum Guidelines for Undergraduate Degree Programs in Information Technology , 2008 .
[6] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[7] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[8] Chris Clifton,et al. Privacy Preserving Data Mining (Advances in Information Security) , 2005 .
[9] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[10] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[11] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[12] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[13] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[15] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[16] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[17] Lorrie Faith Cranor,et al. P3P deployment on websites , 2008, Electron. Commer. Res. Appl..
[18] Felix Brandt,et al. Fundamental aspects of privacy and deception in electronic auctions , 2003 .
[19] Latanya Sweeney,et al. Guaranteeing anonymity when sharing medical data, the Datafly System , 1997, AMIA.
[20] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[21] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[22] Chris Clifton,et al. Thoughts on k-Anonymization , 2006, ICDE Workshops.
[23] Lorrie Faith Cranor,et al. A Shortage of Privacy Engineers , 2013, IEEE Security & Privacy.
[24] Ryan T. Wright,et al. IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems , 2010, Commun. Assoc. Inf. Syst..
[25] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .