BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
data (30)
privaci (15)
base (13)
network (11)
preserv (8)

Stem anonym$ (all stems)

101 papers:

STOCSTOC-2015-ChenDO #complexity #game studies #nash #on the
On the Complexity of Nash Equilibria in Anonymous Games (XC, DD, AO), pp. 381–390.
CHICHI-2015-BirnholtzMP #facebook #quote
“Is it Weird to Still Be a Virgin”: Anonymous, Locally Targeted Questions on Facebook Confession Boards (JPB, NARM, AP), pp. 2613–2622.
CSCWCSCW-2015-Leavitt #community #online #quote #single use
“This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community (AL), pp. 317–327.
SEKESEKE-2015-LiuXC #learning #recommendation
Context-aware Recommendation System with Anonymous User Profile Learning (YL, YX, MC), pp. 93–98.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
ICALPICALP-v2-2014-EmekSW #network
Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs (YE, JS, RW), pp. 183–195.
CAiSECAiSE-2014-HeidingerBBR #framework #named #towards
FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing — Exploratory Paper (CH, KB, EB, KR), pp. 120–135.
ICPRICPR-2014-FletcherI #dataset #evaluation #quality
Quality Evaluation of an Anonymized Dataset (SF, MZI), pp. 3594–3599.
ICPRICPR-2014-ZhangLNT #privacy
Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
SACSAC-2014-EmuraKOT #communication #formal method #implementation #prototype
Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
SACSAC-2014-ShangHHCK #personalisation #recommendation #towards
Beyond personalization and anonymity: towards a group-based recommender system (SS, YH, PH, PC, SRK), pp. 266–273.
ICALPICALP-v2-2013-HartungNNS #analysis #complexity #graph
A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
IFMIFM-2013-MoranHS #automation #verification
Automated Anonymity Verification of the ThreeBallot Voting System (MM, JH, SS), pp. 94–108.
CHICHI-2013-KangBK #design #internet #people #policy #why
Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
CIKMCIKM-2013-HermanssonKJJD #ambiguity #graph #kernel #using
Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
ECIRECIR-2013-CarpinetoR #concept #graph #query #semantics
Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph (CC, GR), pp. 110–121.
ASEASE-2012-LuciaLJB #evolution #named #source code #testing
kbe-anonymity: test data anonymization for evolving programs (L, DL, LJ, AB), pp. 262–265.
ICALPICALP-v2-2012-DieudonneP #network
Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports (YD, AP), pp. 500–512.
ICALPICALP-v2-2012-GoodrichM #parallel
Anonymous Card Shuffling and Its Applications to Parallel Mixnets (MTG, MM), pp. 549–560.
CIKMCIKM-2012-BarbosaPG #algorithm #query
Generically extending anonymization algorithms to deal with successive queries (MB, AP, BG), pp. 1362–1371.
CIKMCIKM-2012-XueKRKP #network #random #social
Delineating social network data anonymization via random edge perturbation (MX, PK, CR, PK, HKP), pp. 475–484.
KDDKDD-2012-XueKRVT
Anonymizing set-valued data by nonreciprocal recoding (MX, PK, CR, JV, KLT), pp. 1050–1058.
SACSAC-2012-KarakasidisV
Reference table based k-anonymous private blocking (AK, VSV), pp. 859–864.
OSDIOSDI-2012-WolinskyCFJ
Dissent in Numbers: Making Strong Anonymity Scale (DIW, HCG, BF, AJ), pp. 179–182.
LICSLICS-2012-Feigenbaum #privacy
Privacy, Anonymity, and Accountability in Ad-Supported Services (JF), pp. 9–10.
PLDIPLDI-2011-BudiLJL #behaviour #debugging #named
kb-anonymity: a model for anonymized behaviour-preserving test and debugging data (AB, DL, LJ, L), pp. 447–457.
CIKMCIKM-2011-XueKRP
Utility-driven anonymization in data publishing (MX, PK, CR, HKP), pp. 2277–2280.
KDDKDD-2011-Cormode #learning #privacy
Personal privacy vs population privacy: learning to attack anonymization (GC), pp. 1253–1261.
KDDKDD-2011-PedarsaniG #network #on the #privacy
On the privacy of anonymized networks (PP, MG), pp. 1235–1243.
SIGIRSIGIR-2011-FeildAG #distributed #named
CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
RERE-2011-BrillK #elicitation #requirements
Structured and unobtrusive observation of anonymous users and their context for requirements elicitation (OB, EK), pp. 175–184.
SACSAC-2011-RahmanHA11a #named #privacy #quantifier #towards
ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
ICSEICSE-2011-ClauseO #automation #named
Camouflage: automated anonymization of field data (JAC, AO), pp. 21–30.
VLDBVLDB-2010-CaoKRT #named #transaction
rho-uncertainty: Inference-Proof Transaction Anonymization (JC, PK, CR, KLT), pp. 1033–1044.
VLDBVLDB-2010-CormodeLLS
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
CIKMCIKM-2010-BurghardtBGC #question
Search-log anonymization and advertisement: are they mutually exclusive? (TB, KB, AG, CC), pp. 1269–1272.
CIKMCIKM-2010-ShangCSCH #towards
(k, P)-anonymity: towards pattern-preserving anonymity of time-series data (XS, KC, LS, GC, TH), pp. 1333–1336.
CIKMCIKM-2010-ShiXF
Anonymizing data with quasi-sensitive attribute values (PS, LX, BCMF), pp. 1389–1392.
KDDKDD-2010-TaiYC #mining #outsourcing #pseudo #taxonomy
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining (CHT, PSY, MSC), pp. 473–482.
SACSAC-2010-CampanTC #bound
User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
SACSAC-2010-Coen-PorisiniCS #network
Dealing with anonymity in wireless sensor networks (ACP, PC, SS), pp. 2216–2223.
SIGMODSIGMOD-2009-CormodeS #generative #modelling
Anonymized data: generation, models, usage (GC, DS), pp. 1015–1018.
SIGMODSIGMOD-2009-XiaoWG #interactive
Interactive anonymization of sensitive data (XX, GW, JG), pp. 1051–1054.
VLDBVLDB-2009-CormodeSBK #graph #network #social
Class-based graph anonymization for social network data (GC, DS, SB, BK), pp. 766–777.
VLDBVLDB-2009-DaiGBBL #analysis #interactive #named
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
VLDBVLDB-2009-HeN #top-down
Anonymization of Set-Valued Data via Top-Down, Local Generalization (YH, JFN), pp. 934–945.
VLDBVLDB-2009-KoudasSYZ
Distribution-based Microdata Anonymization (NK, DS, TY, QZ), pp. 958–969.
CIKMCIKM-2009-DewriRRW #identification #named
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice (RD, IR, IR, DW), pp. 1037–1046.
CIKMCIKM-2009-HongHVAA #effectiveness #query
Effective anonymization of query logs (YH, XH, JV, NRA, VA), pp. 1465–1468.
CIKMCIKM-2009-MohammedFD #analysis
Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
CIKMCIKM-2009-Muntes-MuleroN #dataset #privacy #scalability
Privacy and anonymization for very large datasets (VMM, JN), pp. 2117–2118.
CIKMCIKM-2009-XuWYF #online #personalisation #web #web service
Online anonymity for personalized web services (YX, KW, GY, AWCF), pp. 1497–1500.
KDDKDD-2009-AshrafiN
Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
KDDKDD-2009-MohammedFHL #case study
Anonymizing healthcare data: a case study on the blood transfusion service (NM, BCMF, PCKH, CkL), pp. 1285–1294.
SACSAC-2009-KingLS #network #taxonomy
A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
SACSAC-2009-OGormanB #correlation #network
Improving stream correlation attacks on anonymous networks (GO, SB), pp. 2024–2028.
SIGMODSIGMOD-2008-GhinitaKKST #query
Private queries in location based services: anonymizers are not necessary (GG, PK, AK, CS, KLT), pp. 121–132.
SIGMODSIGMOD-2008-LiuT #graph #towards
Towards identity anonymization on graphs (KL, ET), pp. 93–106.
SIGMODSIGMOD-2008-XiaoT #analysis #privacy #statistics
Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
VLDBVLDB-2008-CormodeSYZ #graph #using
Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
VLDBVLDB-2008-HayMJTW #identification #network #social
Resisting structural re-identification in anonymized social networks (MH, GM, DJ, DFT, PW), pp. 102–114.
VLDBVLDB-2008-TerrovitisMK #privacy
Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
CHICHI-2008-KangWA #interactive #mobile #social #using #video
Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
KDDKDD-2008-BrickellS #cost analysis #privacy
The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
KDDKDD-2008-XuWFY #database #transaction
Anonymizing transaction databases for publication (YX, KW, AWCF, PSY), pp. 767–775.
SACSAC-2008-GantaA #adaptation #enterprise #privacy
Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
SACSAC-2008-ZuqueteA
Verifiable anonymous vote submission (AZ, FA), pp. 2159–2166.
SIGMODSIGMOD-2007-ParkS #algorithm #approximate
Approximate algorithms for K-anonymity (HP, KS), pp. 67–78.
VLDBVLDB-2007-GhinitaKKM #performance
Fast Data Anonymization with Low Information Loss (GG, PK, PK, NM), pp. 758–769.
VLDBVLDB-2007-IwuchukwuN #incremental #scalability #towards
K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization (TI, JFN), pp. 746–757.
ESOPESOP-2007-HasuoK #algebra #probability #simulation
Probabilistic Anonymity Via Coalgebraic Simulations (IH, YK), pp. 379–394.
SACSAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SACSAC-2007-TrutaC #incremental #maintenance #optimisation
K-anonymization incremental maintenance and optimization techniques (TMT, AC), pp. 380–387.
PODSPODS-2006-AggarwalFKKPTZ #clustering
Achieving anonymity via clustering (GA, TF, KK, SK, RP, DT, AZ), pp. 153–162.
SIGMODSIGMOD-2006-KiferG #dataset #injection
Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
ITiCSEITiCSE-2006-GuerreiroG
Combating anonymousness in populous CS1 and CS2 courses (PG, KG), pp. 8–12.
CHICHI-2006-TangKFH #approach #people #privacy
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
EDOCEDOC-2006-WangCL #enterprise #persistent #security
Anonymity and Security Support for Persistent Enterprise Conversation (CW, DKWC, HfL), pp. 471–476.
KDDKDD-2006-BrickellS #performance
Efficient anonymity-preserving data collection (JB, VS), pp. 76–85.
KDDKDD-2006-LeFevreDR
Workload-aware anonymization (KL, DJD, RR), pp. 277–286.
KDDKDD-2006-WangF
Anonymizing sequential releases (KW, BCMF), pp. 414–423.
KDDKDD-2006-WongLFW #privacy
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
KDDKDD-2006-XuWPWSF #using
Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
SIGIRSIGIR-2006-BoydellS #personalisation #pseudo #web
Community-based snippet-indexes for pseudo-anonymous personalization in web search (OB, BS), pp. 617–618.
SACSAC-2006-AtzoriBGP #towards
Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
PODSPODS-2005-ZhongYW #privacy
Privacy-enhancing k-anonymization of customer data (SZ, ZY, RNW), pp. 139–147.
SIGMODSIGMOD-2005-LakshmananNR
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data (LVSL, RTN, GR), pp. 61–72.
SIGMODSIGMOD-2005-LeFevreDR #named #performance
Incognito: Efficient Full-Domain K-Anonymity (KL, DJD, RR), pp. 49–60.
VLDBVLDB-2005-Aggarwal #on the
On k-Anonymity and the Curse of Dimensionality (CCA), pp. 901–909.
VLDBVLDB-2005-YaoWJ
Checking for k-Anonymity Violation by Views (CY, XSW, SJ), pp. 910–921.
KDDKDD-2005-YangZW
Anonymity-preserving data collection (ZY, SZ, RNW), pp. 334–343.
PODSPODS-2004-MeyersonW #complexity #on the
On the Complexity of Optimal K-Anonymity (AM, RW), pp. 223–228.
SACSAC-2004-EgidiP #case study #certification #email
Anonymity and certification: e-mail, a case study (LE, GP), pp. 397–403.
SACSAC-2004-StraubH #mobile #recommendation
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation (TS, AH), pp. 766–773.
ICALPICALP-2003-Fiat #network
Some Issues Regarding Search, Censorship, and Anonymity in Peer to Peer Networks (AF), p. 33.
ICEISICEIS-2002-Payeras-CapellaFR #named
ITHAKI: Fair N-Transferable Anonymous Cash (MPC, JLFG, LHiR), pp. 900–907.
FMFM-v1-1999-SyversonS #formal method
Group Principals and the Formalization of Anonymity (PFS, SGS), pp. 814–833.
PODSPODS-1998-SamaratiS
Generalizing Data to Provide Anonymity when Disclosing Information (Abstract) (PS, LS), p. 188.
VLDBVLDB-1998-Tygar #distributed #transaction
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce (JDT), pp. 1–12.
KDDKDD-1995-Klosgen #database #information management
Anonymization Techniques for Knowledge Discovery in Databases (WK), pp. 186–191.
ICALPICALP-1990-KranakisKB #network
Computing Boolean Functions on Anonymous Networks (EK, DK, JvdB), pp. 254–267.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.