The chapter 'A data utility-driven benchmark for de-identi¿cation methods' is open access under a...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
This book constitutes the refereed proceedings of the 9th International Conference on Information...
This book constitutes the thoroughly refereed post-conference proceedings of the Third Internatio...
During recent years, a continuously increasing amount of personal data has been made available th...
The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were s...
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Pri...
This book constitutes the refereed post-conference proceedings of the 6th International Workshop ...
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Wo...
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven Inte...
According to recent surveys, privacy and anonymity are the fundamental issues of concern for most...
This book presents the combined proceedings of the 16th International Conference on Computer Scie...