Mining recommendations from the web
Proceedings of the 2008 ACM conference on Recommender systems
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Releasing search queries and clicks privately
Proceedings of the 18th international conference on World wide web
Proceedings of the 18th international conference on World wide web
The union-split algorithm and cluster-based anonymization of social networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Universally utility-maximizing privacy mechanisms
Proceedings of the forty-first annual ACM symposium on Theory of computing
Differentially private recommender systems: building privacy into the net
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
User Profiling and Re-identification: Case of University-Wide Network Analysis
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
Proceedings of the third ACM conference on Recommender systems
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Controlling data in the cloud: outsourcing computation without outsourcing control
Proceedings of the 2009 ACM workshop on Cloud computing security
A verifiable, centralized, coercion-free reputation system
Proceedings of the 8th ACM workshop on Privacy in the electronic society
StarClique: guaranteeing user privacy in social networks against intersection attacks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Secure construction of k-unlinkable patient records from distributed providers
Artificial Intelligence in Medicine
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM
Differential privacy for collaborative security
Proceedings of the Third European Workshop on System Security
Universally optimal privacy mechanisms for minimax agents
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Differentially-private network trace analysis
Proceedings of the ACM SIGCOMM 2010 conference
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
xBook: redesigning privacy control in social networking platforms
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Distance makes the types grow stronger: a calculus for differential privacy
Proceedings of the 15th ACM SIGPLAN international conference on Functional programming
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Private and continual release of statistics
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
unfriendly: multi-party privacy risks in social networks
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
"But the data is already public": on the ethics of research in Facebook
Ethics and Information Technology
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
PCTA: privacy-constrained clustering-based transaction data anonymization
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Exposing the lack of privacy in file hosting services
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
On the privacy of anonymized networks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Challenges in experimenting with botnet detection systems
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
PIR-Tor: scalable anonymous communication using private information retrieval
SEC'11 Proceedings of the 20th USENIX conference on Security
Differential privacy under fire
SEC'11 Proceedings of the 20th USENIX conference on Security
Protecting privacy in data release
Foundations of security analysis and design VI
Pseudonymization service for X-road eGovernment data exchange layer
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Quantitative information flow, with a view
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Communications of the ACM
Private and Continual Release of Statistics
ACM Transactions on Information and System Security (TISSEC)
Compressive mechanism: utilizing sparse representation in differential privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Sharing graphs using differentially private graph models
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Structural Workshop Paper---Data Selection and Procurement
Marketing Science
Uniqueness and how it impacts privacy in health-related social science datasets
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
On sketch based anonymization that satisfies differential privacy model
AI'10 Proceedings of the 23rd Canadian conference on Advances in Artificial Intelligence
The case for an open science in technology enhanced learning
International Journal of Technology Enhanced Learning
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Satisfying privacy requirements: one step before anonymization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases
Marketing Science
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
Private similarity computation in distributed systems: from cryptography to differential privacy
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
Collaborative Filtering Recommender Systems
Foundations and Trends in Human-Computer Interaction
The million song dataset challenge
Proceedings of the 21st international conference companion on World Wide Web
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
GUPT: privacy preserving data analysis made easy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Beating randomized response on incoherent matrices
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
The loss of location privacy in the cellular age
Communications of the ACM
Provable de-anonymization of large datasets with sparse dimensions
POST'12 Proceedings of the First international conference on Principles of Security and Trust
On the identity anonymization of high-dimensional rating data
Concurrency and Computation: Practice & Experience
Analyzing characteristic host access patterns for re-identification of web user sessions
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Is more always merrier?: a deep dive into online social footprints
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Use fewer instances of the letter "i": toward writing style anonymization
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Privacy preserving boosting in the cloud with secure half-space queries
Proceedings of the 2012 ACM conference on Computer and communications security
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
On the feasibility of user de-anonymization from shared mobile sensor data
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
Inferring personal traits from music listening history
Proceedings of the second international ACM workshop on Music information retrieval with user-centered and multimodal strategies
Generically extending anonymization algorithms to deal with successive queries
Proceedings of the 21st ACM international conference on Information and knowledge management
Quantifying paedophile activity in a large P2P system
Information Processing and Management: an International Journal
Worst- and average-case privacy breaches in randomization mechanisms
TCS'12 Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
Theoretical Results on De-Anonymization via Linkage Attacks
Transactions on Data Privacy
Linear dependent types for differential privacy
POPL '13 Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
Privacy auctions for recommender systems
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
A framework for context-aware privacy of sensor data on mobile systems
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
A Guide to Differential Privacy Theory in Social Network Analysis
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Publishing trajectories with differential privacy guarantees
Proceedings of the 25th International Conference on Scientific and Statistical Database Management
Connecting users across social media sites: a behavioral-modeling approach
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
A tool for collecting provenance data in social media
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Exploiting innocuous activity for correlating users across sites
Proceedings of the 22nd international conference on World Wide Web
Proceedings of the 22nd international conference on World Wide Web
Beyond worst-case analysis in private singular vector computation
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Integer partitioning based encryption for privacy preservation in data mining
Proceedings of the First International Conference on Security of Internet of Things
Differential privacy for neighborhood-based collaborative filtering
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Proceedings of the Ninth Symposium on Usable Privacy and Security
Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions
Journal of Grid Computing
Membership privacy: a unifying framework for privacy definitions
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Privacy-preserving matrix factorization
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On the challenges of balancing privacy and utility of open health data
Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
You cannot hide for long: de-anonymization of real-world dynamic behaviour
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
On the use of decentralization to enable privacy in web-scale recommendation services
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Challenges of keyword-based location disclosure
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Inferring trip destinations from driving habits data
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
Unlinkable content playbacks in a multiparty DRM system
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Exposing and mitigating privacy loss in crowdsourced survey platforms
Proceedings of the 2013 workshop on Student workhop
Application-layer design patterns for accountable-anonymous online identities
Telecommunications Policy
SocialSearch+: enriching social network with web evidences
World Wide Web
Hi-index | 0.05 |
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity provided and the quality of service, as measured by network latency, is analyzed ...