PODS '91 Proceedings of the tenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
A universal-scheme approach to statistical databases containing homogeneous summary tables
ACM Transactions on Database Systems (TODS)
SCG '99 Proceedings of the fifteenth annual symposium on Computational geometry
Suppressing marginal totals from a two-dimensional table to protect sensitive information
Statistics and Computing
Partial cell suppression: A new methodology for statistical disclosure control
Statistics and Computing
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Extending Cell Suppression to Protect Tabular Data against Several Attackers
Inference Control in Statistical Databases, From Theory to Practice
Censoring Statistical Tables to Protect Sensitive Information: Easy and Hard Problems
SSDBM '96 Proceedings of the Eighth International Conference on Scientific and Statistical Database Management
Security Problems for Statistical Databases with General Cell Suppressions
SSDBM '97 Proceedings of the Ninth International Conference on Scientific and Statistical Database Management
Quantifying Privacy Leakage through Answering Database Queries
ISC '02 Proceedings of the 5th International Conference on Information Security
Multidimensional databases
Privacy in multidimensional databases
Multidimensional databases
Exact disclosure prevention in two-dimensional statistical tables
Computers and Operations Research
Auditing sum-queries to make a statistical database secure
ACM Transactions on Information and System Security (TISSEC)
Minimal invariant sets in a vertex-weighted graph
Theoretical Computer Science
Statistical confidentiality: Optimization techniques to protect tables
Computers and Operations Research
Smallest Bipartite Bridge-Connectivity Augmentation (Extended Abstract)
AAIM '07 Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management
An efficient algorithm for minimum feedback vertex sets in rotator graphs
Information Processing Letters
Markov bases of three-way tables are arbitrarily complicated
Journal of Symbolic Computation
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
The bridge-connectivity augmentation problem with a partition constraint
Theoretical Computer Science
Two hardness results on feedback vertex sets
FAW-AAIM'11 Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management
Tractable feedback vertex sets in restricted bipartite graphs
COCOA'11 Proceedings of the 5th international conference on Combinatorial optimization and applications
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
ACIIDS'13 Proceedings of the 5th Asian conference on Intelligent Information and Database Systems - Volume Part II
Feedback vertex sets on restricted bipartite graphs
Theoretical Computer Science
Hi-index | 0.00 |