Transactions on Data Privacy

短名Trans. Data. Priv.
Journal Impact1.08
国际分区COMPUTER SCIENCE, THEORY & METHODS(Q3)
ISSN1888-5063, 2013-1631
h-index28
涉及主题计算机科学计算机安全数学数据挖掘法学政治学互联网隐私统计人工智能信息隐私操作系统算法哲学工程类物理程序设计语言经济机器学习认识论生物数据库计算机网络
出版信息出版商: University of Skovde出版周期: 期刊类型: journal
基本数据创刊年份: 2009原创研究文献占比100.00%自引率:22.20%Gold OA占比: 0.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

The Impact of Synthetic Data Generation on Data Utility with Application to the 1991 UK Samples of Anonymised Records

2020-4-19

Solving the disclosure auditing problem for secondary cell suppression by means of linear programming

2020-1-1

Bayesian-based anonymization framework against background knowledge attack in continuous data publishing

2019-12-1

Analyzing the disclosure risk of regression coefficients

2019-4-30

Comparison of Three Post-tabular Confidentiality Approaches for Survey Weighted Frequency Tables

2019-1-1

Privacy in Multiple On-line Social Networks - Re-identification and Predictability

2019-1-1

Big Data Privacy Context: Literature Effects On Secure Informational Assets.

2018-12-1

Anonymising social graphs in the presence of active attackers

2018-8-1

PATCONFDB: Design and Evaluation of Access Pattern Confidentiality-Preserving Indexes

2018-1-1

Measuring rule retention in anonymized data – when one measure is not enough

2017-12-1

Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization Hierarchies

2017-4-1

Feature Selection for Classification under Anonymity Constraint

2017-4-1

Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization Hierarchies

2017-4-1

DBMask: Fine-Grained Access Control on Encrypted Relational Databases

2016-12-1

pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT

2016-8-1

Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup

2016-8-1

Lightning: Utility-Driven Anonymization of High-Dimensional Data

2016-8-1

Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup

2016-8-1

Evaluating the impact of k-anonymization on the inference of interaction networks

2016-4-1

On Differentially Private Longest Increasing Subsequence Computation in Data Stream

2016-4-1

Genomic Data Privacy Protection using Compressed Sensing

2016-4-1

On Differentially Private Longest Increasing Subsequence Computation in Data Stream

2016-4-1

A model driven approach to data privacy verification in E-Health systems

2015-12-1

A model driven approach to data privacy verification in E-Health systems

2015-12-1

Using Identity Separation Against De-anonymization of Social Networks

2015-8-1

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

2015-8-1

Apriori-based algorithms for k m -anonymizing trajectory data

2015-8-1

Analysis and Performance Enhancement to Achieve Recursive (c, l) Diversity Anonymization in Social Networks

2015-8-1

Privacy Preserving Social Network Publication Against Mutual Friend Attacks

2015-8-1

SafeBox: adaptable spatio-temporal generalization for location privacy protection

2015-8-1

Using t-closeness anonymity to control for non-discrimination

2015-8-1

Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks

2015-8-1

Permission-based Index Clustering for Secure Multi-User Search

2015-4-1

Privacy Preserving Linear Regression on Distributed Databases

2015-4-1

Preserving Communities in Anonymized Social Networks

2015-4-1

Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014)

2015-4-1

PeGS: Perturbed Gibbs Samplers that Generate Privacy-Compliant Synthetic Data

2014-12-1

Censors for Boolean Description Logic

2014-12-1

Truly Anonymous Paper Submission and Review Scheme

2014-12-1

A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners

2014-12-1

DPCube: Differentially Private Histogram Release through Multidimensional Partitioning

2014-12-1

A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners

2014-12-1

Truly Anonymous Paper Submission and Review Scheme

2014-12-1

Attribute Based Group Key Management

2014-12-1

Attribute Based Group Key Management

2014-12-1

Apriori-based algorithms for km-anonymizing trajectory data

2014-8-1

Using t-closeness anonymity to control for non-discrimination

2014-8-1

Efficient Graph Based Approach to Large Scale Role Engineering

2014-4-1

Combining Binary Classifiers for a Multiclass Problem with Differential Privacy

2014-4-1

Combining Binary Classifiers for a Multiclass Problem with Differential Privacy

2014-4-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司