default search action
Search dblp for Publications
export results for "toc:db/journals/jpc/jpc1.bht:"
@article{DBLP:journals/jpc/Cox10, author = {Lawrence H. Cox}, title = {Vulnerability of Complementary Cell Suppression to Intruder Attack}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.576}, doi = {10.29012/JPC.V1I2.576}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Cox10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkS10, author = {Cynthia Dwork and Adam D. Smith}, title = {Differential Privacy for Statistics: What we Know and What we Want to Learn}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.570}, doi = {10.29012/JPC.V1I2.570}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg10a, author = {Stephen E. Fienberg}, title = {The Relevance or Irrelevance of Weights for Confidentiality and Statistical Analyses}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.572}, doi = {10.29012/JPC.V1I2.572}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Karr10, author = {Alan F. Karr}, title = {Secure Statistical Analysis of Distributed Databases, Emphasizing What We Don't Know}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.573}, doi = {10.29012/JPC.V1I2.573}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Karr10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KinneyKG10, author = {Satkartar K. Kinney and Alan F. Karr and Joe Fred Gonzalez Jr.}, title = {Data Confidentiality: The Next Five Years Summary and Guide to Papers}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.569}, doi = {10.29012/JPC.V1I2.569}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KinneyKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LinK10, author = {Xiaodong Lin and Alan F. Karr}, title = {Privacy-preserving Maximum Likelihood Estimation for Distributed Data}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.574}, doi = {10.29012/JPC.V1I2.574}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LinK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Reiter10, author = {Jerome P. Reiter}, title = {Multiple Imputation for Disclosure Limitation: Future Research Challenges}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.575}, doi = {10.29012/JPC.V1I2.575}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Reiter10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Singh10, author = {Avinash C. Singh}, title = {Maintaining Analytic Utility while Protecting Confidentiality of Survey and Nonsurvey Data}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.571}, doi = {10.29012/JPC.V1I2.571}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Singh10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Slavkovic10, author = {Aleksandra B. Slavkovic}, title = {Partial Information Releases for Confidential Contingency Table Entries: Present and Future Research Efforts}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.577}, doi = {10.29012/JPC.V1I2.577}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Slavkovic10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AbowdNS09, author = {John M. Abowd and Kobbi Nissim and Chris J. Skinner}, title = {First Issue Editorial}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.562}, doi = {10.29012/JPC.V1I1.562}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AbowdNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AndersonS09, author = {Margo J. Anderson and William Seltzer}, title = {Federal Statistical Confidentiality and Business Data: Twentieth Century Challenges and Continuing Issues}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.563}, doi = {10.29012/JPC.V1I1.563}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AndersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AndersonS09a, author = {Margo J. Anderson and William Seltzer}, title = {Rejoinder}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.565}, doi = {10.29012/JPC.V1I1.565}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AndersonS09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kincannon09, author = {Charles L. Kincannon}, title = {Comment on Article by Anderson and Seltzer}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.564}, doi = {10.29012/JPC.V1I1.564}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Kincannon09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LindellP09, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Multiparty Computation for Privacy-Preserving Data Mining}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.566}, doi = {10.29012/JPC.V1I1.566}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LindellP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ReiterM09, author = {Jerome P. Reiter and Robin Mitra}, title = {Estimating Risks of Identification Disclosure in Partially Synthetic Data}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.567}, doi = {10.29012/JPC.V1I1.567}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/ReiterM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WooROK09, author = {Mi{-}Ja Woo and Jerome P. Reiter and Anna Oganian and Alan F. Karr}, title = {Global Measures of Data Utility for Microdata Masked for Disclosure Limitation}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.568}, doi = {10.29012/JPC.V1I1.568}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/WooROK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.