Author of the publication

Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.

, , , , , and . AINA, page 1035-1042. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information State Based Multimodal Dialogue Management: Estimating Conversational Engagement from Gaze Information., and . IVA, volume 5773 of Lecture Notes in Computer Science, page 531-532. Springer, (2009)Study on Record Linkage of Anonymizied Data., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 19-28 (2018)Synchro: Block-generation Protocol to Synchronously Process Cross-shard Transactions in State Sharding., , and . CoRR, (2023)How to Handle Excessively Anonymized Datasets., , , , , , , and . J. Inf. Process., (2018)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). CoRR, (2021)Evaluation of Secure Remote Offering Service for Information Bank., , and . CODASPY, page 144-146. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Custom-made Anonymization by Data Analysis Program Provided by Recipient., and . CODASPY, page 149-151. ACM, (2019)A Study from the Data Anonymization Competition Pwscup 2015., , , , , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 230-237. Springer, (2016)Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets., , , and . ACSAC, page 146-155. IEEE Computer Society, (2004)Threat Tree Templates to Ease Difficulties in Threat Modeling., and . NBiS, page 673-678. IEEE Computer Society, (2011)