Journal: J. Priv. Confidentiality

Volume 2, Issue 2

0 -- 0Stephen E. Fienberg. In This Issue
0 -- 0Martin M. Merener. Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases
0 -- 0Satkartar K. Kinney, Jerome P. Reiter, James O. Berger. Model Selection when multiple imputation is used to protect confidentiality in public use data
0 -- 0Anne-Sophie Charest. How Can We Analyze Differentially-Private Synthetic Datasets?
0 -- 0Yehuda Lindell. Anonymous Authentication