Transactions on Data Privacy
短名 | Trans. Data. Priv. |
Journal Impact | 1.08 |
国际分区 | COMPUTER SCIENCE, THEORY & METHODS(Q3) |
ISSN | 1888-5063, 2013-1631 |
h-index | 28 |
涉及主题 | 计算机科学计算机安全数学数据挖掘法学政治学互联网隐私统计人工智能信息隐私操作系统算法哲学工程类物理程序设计语言经济机器学习认识论生物数据库计算机网络 |
出版信息 | 出版商: University of Skovde,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2009,原创研究文献占比: 100.00%,自引率:22.20%, Gold OA占比: 0.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
The Impact of Synthetic Data Generation on Data Utility with Application to the 1991 UK Samples of Anonymised Records
2020-4-19
Solving the disclosure auditing problem for secondary cell suppression by means of linear programming
2020-1-1
Bayesian-based anonymization framework against background knowledge attack in continuous data publishing
2019-12-1
Analyzing the disclosure risk of regression coefficients
2019-4-30
Comparison of Three Post-tabular Confidentiality Approaches for Survey Weighted Frequency Tables
2019-1-1
Privacy in Multiple On-line Social Networks - Re-identification and Predictability
2019-1-1
Big Data Privacy Context: Literature Effects On Secure Informational Assets.
2018-12-1
Anonymising social graphs in the presence of active attackers
2018-8-1
PATCONFDB: Design and Evaluation of Access Pattern Confidentiality-Preserving Indexes
2018-1-1
Measuring rule retention in anonymized data – when one measure is not enough
2017-12-1
Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization Hierarchies
2017-4-1
Feature Selection for Classification under Anonymity Constraint
2017-4-1
Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization Hierarchies
2017-4-1
DBMask: Fine-Grained Access Control on Encrypted Relational Databases
2016-12-1
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT
2016-8-1
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup
2016-8-1
Lightning: Utility-Driven Anonymization of High-Dimensional Data
2016-8-1
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup
2016-8-1
Evaluating the impact of k-anonymization on the inference of interaction networks
2016-4-1
On Differentially Private Longest Increasing Subsequence Computation in Data Stream
2016-4-1
Genomic Data Privacy Protection using Compressed Sensing
2016-4-1
On Differentially Private Longest Increasing Subsequence Computation in Data Stream
2016-4-1
A model driven approach to data privacy verification in E-Health systems
2015-12-1
A model driven approach to data privacy verification in E-Health systems
2015-12-1
Using Identity Separation Against De-anonymization of Social Networks
2015-8-1
On the Feasibility of (Practical) Commercial Anonymous Cloud Storage
2015-8-1
Apriori-based algorithms for k m -anonymizing trajectory data
2015-8-1
Analysis and Performance Enhancement to Achieve Recursive (c, l) Diversity Anonymization in Social Networks
2015-8-1
Privacy Preserving Social Network Publication Against Mutual Friend Attacks
2015-8-1
SafeBox: adaptable spatio-temporal generalization for location privacy protection
2015-8-1
Using t-closeness anonymity to control for non-discrimination
2015-8-1
Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks
2015-8-1
Permission-based Index Clustering for Secure Multi-User Search
2015-4-1
Privacy Preserving Linear Regression on Distributed Databases
2015-4-1
Preserving Communities in Anonymized Social Networks
2015-4-1
Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014)
2015-4-1
PeGS: Perturbed Gibbs Samplers that Generate Privacy-Compliant Synthetic Data
2014-12-1
Censors for Boolean Description Logic
2014-12-1
Truly Anonymous Paper Submission and Review Scheme
2014-12-1
A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners
2014-12-1
DPCube: Differentially Private Histogram Release through Multidimensional Partitioning
2014-12-1
A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners
2014-12-1
Truly Anonymous Paper Submission and Review Scheme
2014-12-1
Attribute Based Group Key Management
2014-12-1
Attribute Based Group Key Management
2014-12-1
Apriori-based algorithms for km-anonymizing trajectory data
2014-8-1
Using t-closeness anonymity to control for non-discrimination
2014-8-1
Efficient Graph Based Approach to Large Scale Role Engineering
2014-4-1
Combining Binary Classifiers for a Multiclass Problem with Differential Privacy
2014-4-1
Combining Binary Classifiers for a Multiclass Problem with Differential Privacy
2014-4-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远