researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Priv. Confidentiality
Home
Index
Info
Volume
Volume
2
, Issue
2
0
--
0
Stephen E. Fienberg
.
In This Issue
0
--
0
Martin M. Merener
.
Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases
0
--
0
Satkartar K. Kinney
,
Jerome P. Reiter
,
James O. Berger
.
Model Selection when multiple imputation is used to protect confidentiality in public use data
0
--
0
Anne-Sophie Charest
.
How Can We Analyze Differentially-Private Synthetic Datasets?
0
--
0
Yehuda Lindell
.
Anonymous Authentication
Volume
2
, Issue
1
0
--
0
James Waldo
,
Herbert S. Lin
,
Lawrence H. Cox
.
Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age"
0
--
0
Stephen E. Fienberg
.
Editorial: In This Issue
0
--
0
Natalie Shlomo
.
Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility
0
--
0
William J. Perry
,
Charles M. Vest
.
Protecting Individual Privacy in the Struggle Against Terrorists—A Framework for Program Assessment: Executive Summary
0
--
0
James Waldo
,
Herbert S. Lin
,
Lynette I. Millett
.
Engaging Privacy and Information Technology in a Digital Age: Executive Summary
0
--
0
Shubha U. Nabar
,
Nina Mishra
.
Releasing Private Contingency Tables
0
--
0
Cynthia Dwork
,
Moni Naor
.
On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy
0
--
0
Bruce Schneier
.
Schneier on Security: Privacy and Control
0
--
0
William J. Perry
,
Charles M. Vest
.
The Science and Technology of Privacy Protection: Appendix L of "Protecting Individual Privacy in the Struggle Against Terrorists"