101 papers:
STOC-2015-ChenDO #complexity #game studies #nash #on the- On the Complexity of Nash Equilibria in Anonymous Games (XC, DD, AO), pp. 381–390.
CHI-2015-BirnholtzMP #facebook #quote- “Is it Weird to Still Be a Virgin”: Anonymous, Locally Targeted Questions on Facebook Confession Boards (JPB, NARM, AP), pp. 2613–2622.
CSCW-2015-Leavitt #community #online #quote #single use- “This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community (AL), pp. 317–327.
SEKE-2015-LiuXC #learning #recommendation- Context-aware Recommendation System with Anonymous User Profile Learning (YL, YX, MC), pp. 93–98.
SAC-2015-GouthamLY #authentication #protocol #smarttech #using- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
ICALP-v2-2014-EmekSW #network- Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs (YE, JS, RW), pp. 183–195.
CAiSE-2014-HeidingerBBR #framework #named #towards- FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing — Exploratory Paper (CH, KB, EB, KR), pp. 120–135.
ICPR-2014-FletcherI #dataset #evaluation #quality- Quality Evaluation of an Anonymized Dataset (SF, MZI), pp. 3594–3599.
ICPR-2014-ZhangLNT #privacy- Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
SAC-2014-EmuraKOT #communication #formal method #implementation #prototype- Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
SAC-2014-ShangHHCK #personalisation #recommendation #towards- Beyond personalization and anonymity: towards a group-based recommender system (SS, YH, PH, PC, SRK), pp. 266–273.
ICALP-v2-2013-HartungNNS #analysis #complexity #graph- A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
IFM-2013-MoranHS #automation #verification- Automated Anonymity Verification of the ThreeBallot Voting System (MM, JH, SS), pp. 94–108.
CHI-2013-KangBK #design #internet #people #policy #why- Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
CIKM-2013-HermanssonKJJD #ambiguity #graph #kernel #using- Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
ECIR-2013-CarpinetoR #concept #graph #query #semantics- Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph (CC, GR), pp. 110–121.
ASE-2012-LuciaLJB #evolution #named #source code #testing- kbe-anonymity: test data anonymization for evolving programs (L, DL, LJ, AB), pp. 262–265.
ICALP-v2-2012-DieudonneP #network- Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports (YD, AP), pp. 500–512.
ICALP-v2-2012-GoodrichM #parallel- Anonymous Card Shuffling and Its Applications to Parallel Mixnets (MTG, MM), pp. 549–560.
CIKM-2012-BarbosaPG #algorithm #query- Generically extending anonymization algorithms to deal with successive queries (MB, AP, BG), pp. 1362–1371.
CIKM-2012-XueKRKP #network #random #social- Delineating social network data anonymization via random edge perturbation (MX, PK, CR, PK, HKP), pp. 475–484.
KDD-2012-XueKRVT- Anonymizing set-valued data by nonreciprocal recoding (MX, PK, CR, JV, KLT), pp. 1050–1058.
SAC-2012-KarakasidisV- Reference table based k-anonymous private blocking (AK, VSV), pp. 859–864.
OSDI-2012-WolinskyCFJ- Dissent in Numbers: Making Strong Anonymity Scale (DIW, HCG, BF, AJ), pp. 179–182.
LICS-2012-Feigenbaum #privacy- Privacy, Anonymity, and Accountability in Ad-Supported Services (JF), pp. 9–10.
PLDI-2011-BudiLJL #behaviour #debugging #named- kb-anonymity: a model for anonymized behaviour-preserving test and debugging data (AB, DL, LJ, L), pp. 447–457.
CIKM-2011-XueKRP- Utility-driven anonymization in data publishing (MX, PK, CR, HKP), pp. 2277–2280.
KDD-2011-Cormode #learning #privacy- Personal privacy vs population privacy: learning to attack anonymization (GC), pp. 1253–1261.
KDD-2011-PedarsaniG #network #on the #privacy- On the privacy of anonymized networks (PP, MG), pp. 1235–1243.
SIGIR-2011-FeildAG #distributed #named- CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
RE-2011-BrillK #elicitation #requirements- Structured and unobtrusive observation of anonymous users and their context for requirements elicitation (OB, EK), pp. 175–184.
SAC-2011-RahmanHA11a #named #privacy #quantifier #towards- ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
ICSE-2011-ClauseO #automation #named- Camouflage: automated anonymization of field data (JAC, AO), pp. 21–30.
VLDB-2010-CaoKRT #named #transaction- rho-uncertainty: Inference-Proof Transaction Anonymization (JC, PK, CR, KLT), pp. 1033–1044.
VLDB-2010-CormodeLLS- Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
CIKM-2010-BurghardtBGC #question- Search-log anonymization and advertisement: are they mutually exclusive? (TB, KB, AG, CC), pp. 1269–1272.
CIKM-2010-ShangCSCH #towards- (k, P)-anonymity: towards pattern-preserving anonymity of time-series data (XS, KC, LS, GC, TH), pp. 1333–1336.
CIKM-2010-ShiXF- Anonymizing data with quasi-sensitive attribute values (PS, LX, BCMF), pp. 1389–1392.
KDD-2010-TaiYC #mining #outsourcing #pseudo #taxonomy- k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining (CHT, PSY, MSC), pp. 473–482.
SAC-2010-CampanTC #bound- User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
SAC-2010-Coen-PorisiniCS #network- Dealing with anonymity in wireless sensor networks (ACP, PC, SS), pp. 2216–2223.
SIGMOD-2009-CormodeS #generative #modelling- Anonymized data: generation, models, usage (GC, DS), pp. 1015–1018.
SIGMOD-2009-XiaoWG #interactive- Interactive anonymization of sensitive data (XX, GW, JG), pp. 1051–1054.
VLDB-2009-CormodeSBK #graph #network #social- Class-based graph anonymization for social network data (GC, DS, SB, BK), pp. 766–777.
VLDB-2009-DaiGBBL #analysis #interactive #named- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
VLDB-2009-HeN #top-down- Anonymization of Set-Valued Data via Top-Down, Local Generalization (YH, JFN), pp. 934–945.
VLDB-2009-KoudasSYZ- Distribution-based Microdata Anonymization (NK, DS, TY, QZ), pp. 958–969.
CIKM-2009-DewriRRW #identification #named- POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice (RD, IR, IR, DW), pp. 1037–1046.
CIKM-2009-HongHVAA #effectiveness #query- Effective anonymization of query logs (YH, XH, JV, NRA, VA), pp. 1465–1468.
CIKM-2009-MohammedFD #analysis- Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
CIKM-2009-Muntes-MuleroN #dataset #privacy #scalability- Privacy and anonymization for very large datasets (VMM, JN), pp. 2117–2118.
CIKM-2009-XuWYF #online #personalisation #web #web service- Online anonymity for personalized web services (YX, KW, GY, AWCF), pp. 1497–1500.
KDD-2009-AshrafiN- Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
KDD-2009-MohammedFHL #case study- Anonymizing healthcare data: a case study on the blood transfusion service (NM, BCMF, PCKH, CkL), pp. 1285–1294.
SAC-2009-KingLS #network #taxonomy- A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
SAC-2009-OGormanB #correlation #network- Improving stream correlation attacks on anonymous networks (GO, SB), pp. 2024–2028.
SIGMOD-2008-GhinitaKKST #query- Private queries in location based services: anonymizers are not necessary (GG, PK, AK, CS, KLT), pp. 121–132.
SIGMOD-2008-LiuT #graph #towards- Towards identity anonymization on graphs (KL, ET), pp. 93–106.
SIGMOD-2008-XiaoT #analysis #privacy #statistics- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
VLDB-2008-CormodeSYZ #graph #using- Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
VLDB-2008-HayMJTW #identification #network #social- Resisting structural re-identification in anonymized social networks (MH, GM, DJ, DFT, PW), pp. 102–114.
VLDB-2008-TerrovitisMK #privacy- Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
CHI-2008-KangWA #interactive #mobile #social #using #video- Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
KDD-2008-BrickellS #cost analysis #privacy- The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
KDD-2008-XuWFY #database #transaction- Anonymizing transaction databases for publication (YX, KW, AWCF, PSY), pp. 767–775.
SAC-2008-GantaA #adaptation #enterprise #privacy- Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
SAC-2008-ZuqueteA- Verifiable anonymous vote submission (AZ, FA), pp. 2159–2166.
SIGMOD-2007-ParkS #algorithm #approximate- Approximate algorithms for K-anonymity (HP, KS), pp. 67–78.
VLDB-2007-GhinitaKKM #performance- Fast Data Anonymization with Low Information Loss (GG, PK, PK, NM), pp. 758–769.
VLDB-2007-IwuchukwuN #incremental #scalability #towards- K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization (TI, JFN), pp. 746–757.
ESOP-2007-HasuoK #algebra #probability #simulation- Probabilistic Anonymity Via Coalgebraic Simulations (IH, YK), pp. 379–394.
SAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SAC-2007-TrutaC #incremental #maintenance #optimisation- K-anonymization incremental maintenance and optimization techniques (TMT, AC), pp. 380–387.
PODS-2006-AggarwalFKKPTZ #clustering- Achieving anonymity via clustering (GA, TF, KK, SK, RP, DT, AZ), pp. 153–162.
SIGMOD-2006-KiferG #dataset #injection- Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
ITiCSE-2006-GuerreiroG- Combating anonymousness in populous CS1 and CS2 courses (PG, KG), pp. 8–12.
CHI-2006-TangKFH #approach #people #privacy- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
EDOC-2006-WangCL #enterprise #persistent #security- Anonymity and Security Support for Persistent Enterprise Conversation (CW, DKWC, HfL), pp. 471–476.
KDD-2006-BrickellS #performance- Efficient anonymity-preserving data collection (JB, VS), pp. 76–85.
KDD-2006-LeFevreDR- Workload-aware anonymization (KL, DJD, RR), pp. 277–286.
KDD-2006-WangF- Anonymizing sequential releases (KW, BCMF), pp. 414–423.
KDD-2006-WongLFW #privacy- (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
KDD-2006-XuWPWSF #using- Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
SIGIR-2006-BoydellS #personalisation #pseudo #web- Community-based snippet-indexes for pseudo-anonymous personalization in web search (OB, BS), pp. 617–618.
SAC-2006-AtzoriBGP #towards- Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
PODS-2005-ZhongYW #privacy- Privacy-enhancing k-anonymization of customer data (SZ, ZY, RNW), pp. 139–147.
SIGMOD-2005-LakshmananNR- To Do or Not To Do: The Dilemma of Disclosing Anonymized Data (LVSL, RTN, GR), pp. 61–72.
SIGMOD-2005-LeFevreDR #named #performance- Incognito: Efficient Full-Domain K-Anonymity (KL, DJD, RR), pp. 49–60.
VLDB-2005-Aggarwal #on the- On k-Anonymity and the Curse of Dimensionality (CCA), pp. 901–909.
VLDB-2005-YaoWJ- Checking for k-Anonymity Violation by Views (CY, XSW, SJ), pp. 910–921.
KDD-2005-YangZW- Anonymity-preserving data collection (ZY, SZ, RNW), pp. 334–343.
PODS-2004-MeyersonW #complexity #on the- On the Complexity of Optimal K-Anonymity (AM, RW), pp. 223–228.
SAC-2004-EgidiP #case study #certification #email- Anonymity and certification: e-mail, a case study (LE, GP), pp. 397–403.
SAC-2004-StraubH #mobile #recommendation- An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation (TS, AH), pp. 766–773.
ICALP-2003-Fiat #network- Some Issues Regarding Search, Censorship, and Anonymity in Peer to Peer Networks (AF), p. 33.
ICEIS-2002-Payeras-CapellaFR #named- ITHAKI: Fair N-Transferable Anonymous Cash (MPC, JLFG, LHiR), pp. 900–907.
FM-v1-1999-SyversonS #formal method- Group Principals and the Formalization of Anonymity (PFS, SGS), pp. 814–833.
PODS-1998-SamaratiS- Generalizing Data to Provide Anonymity when Disclosing Information (Abstract) (PS, LS), p. 188.
VLDB-1998-Tygar #distributed #transaction- Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce (JDT), pp. 1–12.
KDD-1995-Klosgen #database #information management- Anonymization Techniques for Knowledge Discovery in Databases (WK), pp. 186–191.
ICALP-1990-KranakisKB #network- Computing Boolean Functions on Anonymous Networks (EK, DK, JvdB), pp. 254–267.