Search dblp for Publications

export results for "toc:db/journals/jpc/jpc1.bht:"

 download as .bib file

@article{DBLP:journals/jpc/Cox10,
  author       = {Lawrence H. Cox},
  title        = {Vulnerability of Complementary Cell Suppression to Intruder Attack},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.576},
  doi          = {10.29012/JPC.V1I2.576},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Cox10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkS10,
  author       = {Cynthia Dwork and
                  Adam D. Smith},
  title        = {Differential Privacy for Statistics: What we Know and What we Want
                  to Learn},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.570},
  doi          = {10.29012/JPC.V1I2.570},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg10a,
  author       = {Stephen E. Fienberg},
  title        = {The Relevance or Irrelevance of Weights for Confidentiality and Statistical
                  Analyses},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.572},
  doi          = {10.29012/JPC.V1I2.572},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Karr10,
  author       = {Alan F. Karr},
  title        = {Secure Statistical Analysis of Distributed Databases, Emphasizing
                  What We Don't Know},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.573},
  doi          = {10.29012/JPC.V1I2.573},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Karr10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KinneyKG10,
  author       = {Satkartar K. Kinney and
                  Alan F. Karr and
                  Joe Fred Gonzalez Jr.},
  title        = {Data Confidentiality: The Next Five Years Summary and Guide to Papers},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.569},
  doi          = {10.29012/JPC.V1I2.569},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KinneyKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LinK10,
  author       = {Xiaodong Lin and
                  Alan F. Karr},
  title        = {Privacy-preserving Maximum Likelihood Estimation for Distributed Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.574},
  doi          = {10.29012/JPC.V1I2.574},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LinK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Reiter10,
  author       = {Jerome P. Reiter},
  title        = {Multiple Imputation for Disclosure Limitation: Future Research Challenges},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.575},
  doi          = {10.29012/JPC.V1I2.575},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Reiter10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Singh10,
  author       = {Avinash C. Singh},
  title        = {Maintaining Analytic Utility while Protecting Confidentiality of Survey
                  and Nonsurvey Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.571},
  doi          = {10.29012/JPC.V1I2.571},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Singh10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Slavkovic10,
  author       = {Aleksandra B. Slavkovic},
  title        = {Partial Information Releases for Confidential Contingency Table Entries:
                  Present and Future Research Efforts},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.577},
  doi          = {10.29012/JPC.V1I2.577},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Slavkovic10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AbowdNS09,
  author       = {John M. Abowd and
                  Kobbi Nissim and
                  Chris J. Skinner},
  title        = {First Issue Editorial},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.562},
  doi          = {10.29012/JPC.V1I1.562},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AbowdNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AndersonS09,
  author       = {Margo J. Anderson and
                  William Seltzer},
  title        = {Federal Statistical Confidentiality and Business Data: Twentieth Century
                  Challenges and Continuing Issues},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.563},
  doi          = {10.29012/JPC.V1I1.563},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AndersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AndersonS09a,
  author       = {Margo J. Anderson and
                  William Seltzer},
  title        = {Rejoinder},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.565},
  doi          = {10.29012/JPC.V1I1.565},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AndersonS09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kincannon09,
  author       = {Charles L. Kincannon},
  title        = {Comment on Article by Anderson and Seltzer},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.564},
  doi          = {10.29012/JPC.V1I1.564},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Kincannon09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LindellP09,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Multiparty Computation for Privacy-Preserving Data Mining},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.566},
  doi          = {10.29012/JPC.V1I1.566},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LindellP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ReiterM09,
  author       = {Jerome P. Reiter and
                  Robin Mitra},
  title        = {Estimating Risks of Identification Disclosure in Partially Synthetic
                  Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.567},
  doi          = {10.29012/JPC.V1I1.567},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/ReiterM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WooROK09,
  author       = {Mi{-}Ja Woo and
                  Jerome P. Reiter and
                  Anna Oganian and
                  Alan F. Karr},
  title        = {Global Measures of Data Utility for Microdata Masked for Disclosure
                  Limitation},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.568},
  doi          = {10.29012/JPC.V1I1.568},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/WooROK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}