101 papers:
- STOC-2015-ChenDO #complexity #game studies #nash #on the
- On the Complexity of Nash Equilibria in Anonymous Games (XC, DD, AO), pp. 381–390.
- CHI-2015-BirnholtzMP #facebook #quote
- “Is it Weird to Still Be a Virgin”: Anonymous, Locally Targeted Questions on Facebook Confession Boards (JPB, NARM, AP), pp. 2613–2622.
- CSCW-2015-Leavitt #community #online #quote #single use
- “This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community (AL), pp. 317–327.
- SEKE-2015-LiuXC #learning #recommendation
- Context-aware Recommendation System with Anonymous User Profile Learning (YL, YX, MC), pp. 93–98.
- SAC-2015-GouthamLY #authentication #protocol #smarttech #using
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
- ICALP-v2-2014-EmekSW #network
- Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs (YE, JS, RW), pp. 183–195.
- CAiSE-2014-HeidingerBBR #framework #named #towards
- FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing — Exploratory Paper (CH, KB, EB, KR), pp. 120–135.
- ICPR-2014-FletcherI #dataset #evaluation #quality
- Quality Evaluation of an Anonymized Dataset (SF, MZI), pp. 3594–3599.
- ICPR-2014-ZhangLNT #privacy
- Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
- SAC-2014-EmuraKOT #communication #formal method #implementation #prototype
- Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
- SAC-2014-ShangHHCK #personalisation #recommendation #towards
- Beyond personalization and anonymity: towards a group-based recommender system (SS, YH, PH, PC, SRK), pp. 266–273.
- ICALP-v2-2013-HartungNNS #analysis #complexity #graph
- A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
- IFM-2013-MoranHS #automation #verification
- Automated Anonymity Verification of the ThreeBallot Voting System (MM, JH, SS), pp. 94–108.
- CHI-2013-KangBK #design #internet #people #policy #why
- Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
- CIKM-2013-HermanssonKJJD #ambiguity #graph #kernel #using
- Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
- ECIR-2013-CarpinetoR #concept #graph #query #semantics
- Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph (CC, GR), pp. 110–121.
- ASE-2012-LuciaLJB #evolution #named #source code #testing
- kbe-anonymity: test data anonymization for evolving programs (L, DL, LJ, AB), pp. 262–265.
- ICALP-v2-2012-DieudonneP #network
- Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports (YD, AP), pp. 500–512.
- ICALP-v2-2012-GoodrichM #parallel
- Anonymous Card Shuffling and Its Applications to Parallel Mixnets (MTG, MM), pp. 549–560.
- CIKM-2012-BarbosaPG #algorithm #query
- Generically extending anonymization algorithms to deal with successive queries (MB, AP, BG), pp. 1362–1371.
- CIKM-2012-XueKRKP #network #random #social
- Delineating social network data anonymization via random edge perturbation (MX, PK, CR, PK, HKP), pp. 475–484.
- KDD-2012-XueKRVT
- Anonymizing set-valued data by nonreciprocal recoding (MX, PK, CR, JV, KLT), pp. 1050–1058.
- SAC-2012-KarakasidisV
- Reference table based k-anonymous private blocking (AK, VSV), pp. 859–864.
- OSDI-2012-WolinskyCFJ
- Dissent in Numbers: Making Strong Anonymity Scale (DIW, HCG, BF, AJ), pp. 179–182.
- LICS-2012-Feigenbaum #privacy
- Privacy, Anonymity, and Accountability in Ad-Supported Services (JF), pp. 9–10.
- PLDI-2011-BudiLJL #behaviour #debugging #named
- kb-anonymity: a model for anonymized behaviour-preserving test and debugging data (AB, DL, LJ, L), pp. 447–457.
- CIKM-2011-XueKRP
- Utility-driven anonymization in data publishing (MX, PK, CR, HKP), pp. 2277–2280.
- KDD-2011-Cormode #learning #privacy
- Personal privacy vs population privacy: learning to attack anonymization (GC), pp. 1253–1261.
- KDD-2011-PedarsaniG #network #on the #privacy
- On the privacy of anonymized networks (PP, MG), pp. 1235–1243.
- SIGIR-2011-FeildAG #distributed #named
- CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
- RE-2011-BrillK #elicitation #requirements
- Structured and unobtrusive observation of anonymous users and their context for requirements elicitation (OB, EK), pp. 175–184.
- SAC-2011-RahmanHA11a #named #privacy #quantifier #towards
- ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
- ICSE-2011-ClauseO #automation #named
- Camouflage: automated anonymization of field data (JAC, AO), pp. 21–30.
- VLDB-2010-CaoKRT #named #transaction
- rho-uncertainty: Inference-Proof Transaction Anonymization (JC, PK, CR, KLT), pp. 1033–1044.
- VLDB-2010-CormodeLLS
- Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
- CIKM-2010-BurghardtBGC #question
- Search-log anonymization and advertisement: are they mutually exclusive? (TB, KB, AG, CC), pp. 1269–1272.
- CIKM-2010-ShangCSCH #towards
- (k, P)-anonymity: towards pattern-preserving anonymity of time-series data (XS, KC, LS, GC, TH), pp. 1333–1336.
- CIKM-2010-ShiXF
- Anonymizing data with quasi-sensitive attribute values (PS, LX, BCMF), pp. 1389–1392.
- KDD-2010-TaiYC #mining #outsourcing #pseudo #taxonomy
- k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining (CHT, PSY, MSC), pp. 473–482.
- SAC-2010-CampanTC #bound
- User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
- SAC-2010-Coen-PorisiniCS #network
- Dealing with anonymity in wireless sensor networks (ACP, PC, SS), pp. 2216–2223.
- SIGMOD-2009-CormodeS #generative #modelling
- Anonymized data: generation, models, usage (GC, DS), pp. 1015–1018.
- SIGMOD-2009-XiaoWG #interactive
- Interactive anonymization of sensitive data (XX, GW, JG), pp. 1051–1054.
- VLDB-2009-CormodeSBK #graph #network #social
- Class-based graph anonymization for social network data (GC, DS, SB, BK), pp. 766–777.
- VLDB-2009-DaiGBBL #analysis #interactive #named
- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
- VLDB-2009-HeN #top-down
- Anonymization of Set-Valued Data via Top-Down, Local Generalization (YH, JFN), pp. 934–945.
- VLDB-2009-KoudasSYZ
- Distribution-based Microdata Anonymization (NK, DS, TY, QZ), pp. 958–969.
- CIKM-2009-DewriRRW #identification #named
- POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice (RD, IR, IR, DW), pp. 1037–1046.
- CIKM-2009-HongHVAA #effectiveness #query
- Effective anonymization of query logs (YH, XH, JV, NRA, VA), pp. 1465–1468.
- CIKM-2009-MohammedFD #analysis
- Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
- CIKM-2009-Muntes-MuleroN #dataset #privacy #scalability
- Privacy and anonymization for very large datasets (VMM, JN), pp. 2117–2118.
- CIKM-2009-XuWYF #online #personalisation #web #web service
- Online anonymity for personalized web services (YX, KW, GY, AWCF), pp. 1497–1500.
- KDD-2009-AshrafiN
- Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
- KDD-2009-MohammedFHL #case study
- Anonymizing healthcare data: a case study on the blood transfusion service (NM, BCMF, PCKH, CkL), pp. 1285–1294.
- SAC-2009-KingLS #network #taxonomy
- A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
- SAC-2009-OGormanB #correlation #network
- Improving stream correlation attacks on anonymous networks (GO, SB), pp. 2024–2028.
- SIGMOD-2008-GhinitaKKST #query
- Private queries in location based services: anonymizers are not necessary (GG, PK, AK, CS, KLT), pp. 121–132.
- SIGMOD-2008-LiuT #graph #towards
- Towards identity anonymization on graphs (KL, ET), pp. 93–106.
- SIGMOD-2008-XiaoT #analysis #privacy #statistics
- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
- VLDB-2008-CormodeSYZ #graph #using
- Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
- VLDB-2008-HayMJTW #identification #network #social
- Resisting structural re-identification in anonymized social networks (MH, GM, DJ, DFT, PW), pp. 102–114.
- VLDB-2008-TerrovitisMK #privacy
- Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
- CHI-2008-KangWA #interactive #mobile #social #using #video
- Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
- KDD-2008-BrickellS #cost analysis #privacy
- The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
- KDD-2008-XuWFY #database #transaction
- Anonymizing transaction databases for publication (YX, KW, AWCF, PSY), pp. 767–775.
- SAC-2008-GantaA #adaptation #enterprise #privacy
- Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
- SAC-2008-ZuqueteA
- Verifiable anonymous vote submission (AZ, FA), pp. 2159–2166.
- SIGMOD-2007-ParkS #algorithm #approximate
- Approximate algorithms for K-anonymity (HP, KS), pp. 67–78.
- VLDB-2007-GhinitaKKM #performance
- Fast Data Anonymization with Low Information Loss (GG, PK, PK, NM), pp. 758–769.
- VLDB-2007-IwuchukwuN #incremental #scalability #towards
- K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization (TI, JFN), pp. 746–757.
- ESOP-2007-HasuoK #algebra #probability #simulation
- Probabilistic Anonymity Via Coalgebraic Simulations (IH, YK), pp. 379–394.
- SAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-TrutaC #incremental #maintenance #optimisation
- K-anonymization incremental maintenance and optimization techniques (TMT, AC), pp. 380–387.
- PODS-2006-AggarwalFKKPTZ #clustering
- Achieving anonymity via clustering (GA, TF, KK, SK, RP, DT, AZ), pp. 153–162.
- SIGMOD-2006-KiferG #dataset #injection
- Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
- ITiCSE-2006-GuerreiroG
- Combating anonymousness in populous CS1 and CS2 courses (PG, KG), pp. 8–12.
- CHI-2006-TangKFH #approach #people #privacy
- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
- EDOC-2006-WangCL #enterprise #persistent #security
- Anonymity and Security Support for Persistent Enterprise Conversation (CW, DKWC, HfL), pp. 471–476.
- KDD-2006-BrickellS #performance
- Efficient anonymity-preserving data collection (JB, VS), pp. 76–85.
- KDD-2006-LeFevreDR
- Workload-aware anonymization (KL, DJD, RR), pp. 277–286.
- KDD-2006-WangF
- Anonymizing sequential releases (KW, BCMF), pp. 414–423.
- KDD-2006-WongLFW #privacy
- (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
- KDD-2006-XuWPWSF #using
- Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
- SIGIR-2006-BoydellS #personalisation #pseudo #web
- Community-based snippet-indexes for pseudo-anonymous personalization in web search (OB, BS), pp. 617–618.
- SAC-2006-AtzoriBGP #towards
- Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
- PODS-2005-ZhongYW #privacy
- Privacy-enhancing k-anonymization of customer data (SZ, ZY, RNW), pp. 139–147.
- SIGMOD-2005-LakshmananNR
- To Do or Not To Do: The Dilemma of Disclosing Anonymized Data (LVSL, RTN, GR), pp. 61–72.
- SIGMOD-2005-LeFevreDR #named #performance
- Incognito: Efficient Full-Domain K-Anonymity (KL, DJD, RR), pp. 49–60.
- VLDB-2005-Aggarwal #on the
- On k-Anonymity and the Curse of Dimensionality (CCA), pp. 901–909.
- VLDB-2005-YaoWJ
- Checking for k-Anonymity Violation by Views (CY, XSW, SJ), pp. 910–921.
- KDD-2005-YangZW
- Anonymity-preserving data collection (ZY, SZ, RNW), pp. 334–343.
- PODS-2004-MeyersonW #complexity #on the
- On the Complexity of Optimal K-Anonymity (AM, RW), pp. 223–228.
- SAC-2004-EgidiP #case study #certification #email
- Anonymity and certification: e-mail, a case study (LE, GP), pp. 397–403.
- SAC-2004-StraubH #mobile #recommendation
- An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation (TS, AH), pp. 766–773.
- ICALP-2003-Fiat #network
- Some Issues Regarding Search, Censorship, and Anonymity in Peer to Peer Networks (AF), p. 33.
- ICEIS-2002-Payeras-CapellaFR #named
- ITHAKI: Fair N-Transferable Anonymous Cash (MPC, JLFG, LHiR), pp. 900–907.
- FM-v1-1999-SyversonS #formal method
- Group Principals and the Formalization of Anonymity (PFS, SGS), pp. 814–833.
- PODS-1998-SamaratiS
- Generalizing Data to Provide Anonymity when Disclosing Information (Abstract) (PS, LS), p. 188.
- VLDB-1998-Tygar #distributed #transaction
- Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce (JDT), pp. 1–12.
- KDD-1995-Klosgen #database #information management
- Anonymization Techniques for Knowledge Discovery in Databases (WK), pp. 186–191.
- ICALP-1990-KranakisKB #network
- Computing Boolean Functions on Anonymous Networks (EK, DK, JvdB), pp. 254–267.