Author of the publication

How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.

, and . J. Biomed. Informatics, 37 (3): 179-192 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Email alias detection using social network analysis., , and . LinkKDD, page 52-57. ACM, (2005)Determining the identifiability of DNA database entries., and . AMIA, AMIA, (2000)Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm., and . Pacific Symposium on Biocomputing, page 41-52. (2002)Preserving Privacy by De-Identifying Face Images., , and . IEEE Trans. Knowl. Data Eng., 17 (2): 232-243 (2005)Face De-identification., , , , and . Protecting Privacy in Video Surveillance, Springer, (2009)Re-identification of DNA through an automated linkage process., and . AMIA, AMIA, (2001)Composition and Disclosure of Unlinkable Distributed Databases., and . ICDE, page 118. IEEE Computer Society, (2006)Email alias detection using social network analysis, , and . LinkKDD '05: Proceedings of the 3rd international workshop on Link discovery, page 52--57. New York, NY, USA, ACM, (2005)Integrating Utility into Face De-identification., , , and . Privacy Enhancing Technologies, volume 3856 of Lecture Notes in Computer Science, page 227-242. Springer, (2005)How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems., and . J. Biomed. Informatics, 37 (3): 179-192 (2004)