Academic Journals Database
Disseminating quality controlled scientific knowledge

Transactions on Data Privacy

ISSN: 1888--5063
Publisher: IIIA-CSIC


ADD TO MY LIST
 
P3ERS: Privacy-Preserving PEer Review System PDF available

Author(s): Esma Aimeur | Gilles Brassard | Sébastien Gambs | David Schonfeld
Volume: 5
Issue: 3
Year: 2012
Differential Privacy and Statistical Disclosure Risk Measures: An Investigation with Binary Synthetic Data PDF available

Author(s): David McClure | Jerome P. Reiter
Volume: 5
Issue: 3
Year: 2012
t-Plausibility: Generalizing Words to Desensitize Text PDF available

Author(s): Balamurugan Anandan | Chris Clifton | Wei Jiang | Mummoorthy Murugesan | Pedro Pastrana-Camacho | Luo Si
Volume: 5
Issue: 3
Year: 2012
Privacy Preserving Aggregation of Secret Classifiers PDF available

Author(s): Gerald Gavin | Julien Velcin | Philippe Aubertin
Volume: 4
Issue: 3
Year: 2011
Secure Distributed Subgroup Discovery in Horizontally Partitioned Data PDF available

Author(s): Henrik Grosskreutz | Benedikt Lemmen | Stefan Ruuping
Volume: 4
Issue: 3
Year: 2011
Efficient Protocols for Principal Eigenvector Computation over Private Data PDF available

Author(s): Manas A. Pathak | Bhiksha Raj
Volume: 4
Issue: 3
Year: 2011
Foreword for the special issue of selected papers from the 1st ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning PDF available

Author(s): Aris Gkoulalas-Divanis | Yucel Saygin | Vassilios S. Verykios
Volume: 4
Issue: 3
Year: 2011
Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters PDF available

Author(s): Ling Guo | Xintao Wu
Volume: 2
Issue: 3
Year: 2009
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk PDF available

Author(s): Guy Lebanon | Monica Scannapieco | Mohamed R. Fouad | Elisa Bertino
Volume: 2
Issue: 3
Year: 2009
Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images PDF available

Author(s): S. Geetha | Siva S. Sivatha Sindhu | N. Kamaraj
Volume: 1
Issue: 3
Year: 2008
On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems PDF available

Author(s): Maria Bras-Amoros | Josep Domingo-Ferrer
Volume: 1
Issue: 3
Year: 2008
Comparing Fully and Partially Synthetic Datasets for Statistical Disclosure Control in the German IAB Establishment Panel PDF available

Author(s): Jorg Drechsler | Stefan Bender | Susanne Rassler
Volume: 1
Issue: 3
Year: 2008
A Proposal for a Privacy-preserving National Identity Card PDF available

Author(s): Yves Deswarte | Sebastien Gambs
Volume: 3
Issue: 3
Year: 2010
An Improved Formulation of the Disclosure Auditing Problem for Secondary Cell Suppression PDF available

Author(s): Jacco Daalmans | Ton de Waal
Volume: 3
Issue: 3
Year: 2010
An information theoretic approach for privacy metrics PDF available

Author(s): Michele Bezzi
Volume: 3
Issue: 3
Year: 2010
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach PDF available

Author(s): Yasuyuki Tsukada | Ken Mano | Hideki Sakurada | Yoshinobu Kawabe
Volume: 3
Issue: 3
Year: 2010
An Enhanced Utility-Driven Data Anonymization Method PDF available

Author(s): Stuart Morton | Malika Mahoui | P. Joseph Gibson | Saidaiah Yechuri
Volume: 5
Issue: 2
Year: 2012
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining PDF available

Author(s): Hongwei Tian | Weining Zhang | Shouhuai Xu | Patrick Sharkey
Volume: 5
Issue: 2
Year: 2012
Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data PDF available

Author(s): Christine M. O'Keefe | Natalie Shlomo
Volume: 5
Issue: 2
Year: 2012
Theoretical Results on De-Anonymization via Linkage Attacks PDF available

Author(s): Martin M. Merener
Volume: 5
Issue: 2
Year: 2012
Efficient Anonymizations with Enhanced Utility PDF available

Author(s): Jacob Goldberger | Tamir Tassa
Volume: 3
Issue: 2
Year: 2010
The PROBE Framework for the Personalized Cloaking of Private Locations PDF available

Author(s): Maria Luisa Damiani | Elisa Bertino | Claudio Silvestri
Volume: 3
Issue: 2
Year: 2010
Movement Data Anonymity through Generalization PDF available

Author(s): Anna Monreale | Gennady Andrienko | Natalia Andrienko | Fosca Giannotti | Dino Pedreschi | Salvatore Rinzivillo | Stefan Wrobel
Volume: 3
Issue: 2
Year: 2010
P-Sensitive K-Anonymity with Generalization Constraints PDF available

Author(s): Alina Campan | Traian Marius Truta | Nicholas Cooper
Volume: 3
Issue: 2
Year: 2010
New Remote Mutual Authentication Scheme using Smart Cards PDF available

Author(s): Rajaram Ramasamy | Amutha Prabakar Muniyandi
Volume: 2
Issue: 2
Year: 2009
Cryptographically Secure Bloom-Filters PDF available

Author(s): Ryo Nojima | Youki Kadobayashi
Volume: 2
Issue: 2
Year: 2009
Trustable Relays for Anonymous Communication PDF available

Author(s): Carlos Aguilar Melchor | Yves Deswarte
Volume: 2
Issue: 2
Year: 2009
Constrained Microaggregation: Adding Constraints for Data Editing PDF available

Author(s): Vicenc Torra
Volume: 1
Issue: 2
Year: 2008
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro PDF available

Author(s): Matthias Templ
Volume: 1
Issue: 2
Year: 2008
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing PDF available

Author(s): Xiaoxun Sun | Hua Wang | Jiuyong Li | Traian Marius Truta
Volume: 1
Issue: 2
Year: 2008
Show Me How You Move and I Will Tell You Who You Are PDF available

Author(s): Sebastien Gambs | Marc-Olivier Killijian | Miguel Nunez del Prado Cortez
Volume: 4
Issue: 2
Year: 2011
C-safety: a framework for the anonymization of semantic trajectories PDF available

Author(s): Anna Monreale | Roberto Trasarti | Dino Pedreschi | Chiara Renso | Vania Bogorny
Volume: 4
Issue: 2
Year: 2011
Third party geolocation services in LBS: privacy requirements and research issues PDF available

Author(s): Maria Luisa Damiani
Volume: 4
Issue: 2
Year: 2011
Efficient Privacy Preserving Protocols for Similarity Join PDF available

Author(s): Bilal Hawashin | Farshad Fotouhi | Traian Marius Truta | William Grosky
Volume: 5
Issue: 1
Year: 2012
A Practical Differentially Private Random Decision Tree Classifier PDF available

Author(s): Geetha Jagannathan | Krishnan Pillaipakkamnatt | Rebecca N. Wright
Volume: 5
Issue: 1
Year: 2012
Distributing Data for Secure Database Services PDF available

Author(s): Vignesh Ganapathy | Dilys Thomas | Tomas Feder | Hector Garcia-Molina | Rajeev Motwani
Volume: 5
Issue: 1
Year: 2012
Utility-guided Clustering-based Transaction Data Anonymization PDF available

Author(s): Aris Gkoulalas-Divanis | Grigorios Loukides
Volume: 5
Issue: 1
Year: 2012
k-Concealment: An Alternative Model of k-Type Anonymity PDF available

Author(s): Tamir Tassa | Arnon Mazza | Aristides Gionis
Volume: 5
Issue: 1
Year: 2012
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications PDF available

Author(s): Zeghid Medien | Mohsen Machhout | Belgacem Bouallegue | Lazhar Khriji | Adel Baganne | Rached Tourki
Volume: 3
Issue: 1
Year: 2010
Random Forests for Generating Partially Synthetic, Categorical Data PDF available

Author(s): Gregory Caiola | Jerome P. Reiter
Volume: 3
Issue: 1
Year: 2010
Communication-Efficient Privacy-Preserving Clustering PDF available

Author(s): Geetha Jagannathan | Krishnan Pillaipakkamnatt | Rebecca N. Wright | Daryl Umano
Volume: 3
Issue: 1
Year: 2010
Towards Achieving Personalized Privacy for Location-Based Services PDF available

Author(s): Nayot Poolsappasit | Indrakshi Ray
Volume: 2
Issue: 1
Year: 2009
Towards Trajectory Anonymization: a Generalization-Based Approach PDF available

Author(s): Mehmet Ercan Nergiz | Maurizio Atzori | Yucel Saygın | Barıʂ Guc
Volume: 2
Issue: 1
Year: 2009
Location Privacy in Moving-Object Environments PDF available

Author(s): Dan Lin | Elisa Bertino | Reynold Cheng | Sunil Prabhakar
Volume: 2
Issue: 1
Year: 2009
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy PDF available

Author(s): Gabriel Ghinita
Volume: 2
Issue: 1
Year: 2009
A Measure of Disclosure Risk for Tables of Counts PDF available

Author(s): Duncan Smith | Mark Elliot
Volume: 1
Issue: 1
Year: 2008
Generating Sufficiency-based Non-Synthetic Perturbed Data PDF available

Author(s): Krishnamurty Muralidhar | Rathindra Sarathy
Volume: 1
Issue: 1
Year: 2008
Data Access in a Cyber World: Making Use of Cyberinfrastructure PDF available

Author(s): Julia Lane | Pascal Heus | Tim Mulcahy
Volume: 1
Issue: 1
Year: 2008
Editorial PDF available

Author(s): Vicenc Torra | Josep Domingo-Ferrer
Volume: 1
Issue: 1
Year: 2008
Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests PDF available

Author(s): Thorben Burghardt | Klemens Bohm | Achim Guttmann | Chris Clifton
Volume: 4
Issue: 1
Year: 2011
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract PDF available

Author(s): N. J. Croft | M. S. Olivier
Volume: 4
Issue: 1
Year: 2011
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data PDF available

Author(s): Rathindra Sarathy | Krishnamurty Muralidhar
Volume: 4
Issue: 1
Year: 2011
Save time & money - Smart Internet Solutions      Why do you need a reservation system?