Author of the publication

Outlier Protection in Continuous Microdata Masking.

, , and . Privacy in Statistical Databases, volume 3050 of Lecture Notes in Computer Science, page 201-215. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulatable certificateless two-party authenticated key agreement protocol., , , and . Inf. Sci., 180 (6): 1020-1030 (2010)Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications., , and . IEEE Trans. Vehicular Technology, 59 (2): 559-573 (2010)Statistical Disclosure Control, , , , , , and . Wiley, Chichester, (2012)Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes. CoRR, (2012)New Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users., and . CoRR, (2015)The future of statistical disclosure control., and . CoRR, (2018)On the connections between statistical disclosure control for microdata and some artificial intelligence tools., and . Inf. Sci., (2003)Information Loss in Continuous Hybrid Microdata: Subdomain-Level Probabilistic Measures., , and . Soft Computing in Web Information Retrieva, volume 197 of Studies in Fuzziness and Soft Computing, (2006)Multi-Dimensional Randomized Response., and . CoRR, (2020)The Limits of Differential Privacy (and its Misuse in Data Release and Machine Learning)., , and . CoRR, (2020)