Internet security: firewalls and beyond
Communications of the ACM
Computer
Principles for privacy protection software
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On granting limited access to private information
Proceedings of the 10th international conference on World Wide Web
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
ACM SIGCAS Computers and Society
Privacy protection, control of information, and privacy-enhancing technologies
ACM SIGCAS Computers and Society
Key dimensions of business-to-consumer web sites
Information and Management
A Privacy-Enhancing e-Business Model Based on Infomediaries
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
privacy perspective from utilitarianism and metaphysical theories
Current security management & Ethical issues of information technology
Privacy preserving mining of association rules
Information Systems - Knowledge discovery and data mining (KDD 2002)
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Secure function evaluation with ordered binary decision diagrams
Proceedings of the 13th ACM conference on Computer and communications security
What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology
International Journal of Electronic Commerce
A novel data distortion approach via selective SSVD for privacy protection
International Journal of Information and Computer Security
Generalization-Based Privacy-Preserving Data Collection
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Online privacy control via anonymity and pseudonym: Cross-cultural implications
Behaviour & Information Technology
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Efficient privacy preserving k-means clustering
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Internet Privacy Policies: A Review and Survey of the Fortune 50
Information Resources Management Journal
Hi-index | 48.22 |