Author of the publication

Privacy-Preserving Data Publishing: A Survey of Recent Developments

, , , and . ACM Computing Surveys, 42 (4): 1--53 (June 2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A chain structure Bluetooth scatternet topology formation algorithm and simulations., , and . GLOBECOM, page 5. IEEE, (2005)Latent Tunnel Based Information Propagation in Microblog Networks., , and . Social Network Analysis, Springer, (2014)A Dynamically Scalable Cloud Data Infrastructure for Sensor Networks., , , , and . ScienceCloud@HPDC, page 25-28. ACM, (2015)An innovative approach for analysing rank deficient covariance matrices., and . ISIT, page 2596-2600. IEEE, (2012)Profit Mining: From Patterns to Actions., , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 70-87. Springer, (2002)Some Positive Results for Boundedness of Multiple Recursive Rules.. ICDT, volume 893 of Lecture Notes in Computer Science, page 383-396. Springer, (1995)Computing Join Aggregates over Private Tables., , , and . DaWaK, volume 4654 of Lecture Notes in Computer Science, page 78-88. Springer, (2007)Learning Scalable and Precise Representation of Program Semantics.. CoRR, (2019)An adaptive traffic MAC protocol based on correlation of nodes., and . EURASIP J. Wireless Comm. and Networking, (2015)FastChain: Scaling Blockchain System with Informed Neighbor Selection., and . Blockchain, page 376-383. IEEE, (2019)