×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [sensitive attribute]
June 2007 PKCS-11 Protocol for Enterprise Key Management
216 views
155141903 Slicing a New Approach for Privacy Preserving Data Publishing
114 views
Jurnal 3 Strategi
22 views
Filename: SSRN-id2646185.pdfSSRN-id2646185
55 views
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 21 November 2, 2004
230 views
Beyond k-Anonymity Arik Friedman November 2008 Seminar in Databases (236826)
215 views
Sensitive Data Data that should not be made public What if some but not all of the elements of a DB are sensitive Inherently sensitiveInherently sensitive
217 views
Disclosure Limitation Methods and Information Loss for Tabular Data
22 views
Background Knowledge Attack for Generalization based Privacy- Preserving Data Mining
222 views
Prevalence of Blood Doping in Samples Collected from Elite Track and Field Athletes P.-E. Sottas, N. Robinson, G. Fischetto, G. Dollé, J.M. Alonso, and
218 views
Beyond k-Anonymity
74 views
The Impact of Duality on Data Representation Problems Panagiotis Karras HKU, June 14 th, 2007
213 views
Next >