Search dblp for Publications

export results for "stream:streams/journals/tdp:"

 download as .bib file

@article{DBLP:journals/tdp/GalvanGNT21,
  author    = {Edgar Galv{\'{a}}n and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Guillermo Navarro{-}Arribas and
               Vicen{\c{c}} Torra},
  title     = {Agents in a privacy-preserving world},
  journal   = {Trans. Data Priv.},
  volume    = {14},
  number    = {1},
  pages     = {53--63},
  year      = {2021},
  url       = {http://www.tdp.cat/issues21/tdp.a419a21.pdf},
  timestamp = {Mon, 03 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/GalvanGNT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/HornbyH21,
  author    = {Ryan Hornby and
               Jingchen Hu},
  title     = {Identification Risks Evaluation of Partially Synthetic Data with the
               IdentificationRiskCalculation {R} Package},
  journal   = {Trans. Data Priv.},
  volume    = {14},
  number    = {1},
  pages     = {37--52},
  year      = {2021},
  url       = {http://www.tdp.cat/issues21/tdp.a425a21.pdf},
  timestamp = {Mon, 03 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/HornbyH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Majedi021,
  author    = {Maryam Majedi and
               Ken Barker},
  title     = {The Privacy Policy Permission Model: {A} Unified View of Privacy Policies},
  journal   = {Trans. Data Priv.},
  volume    = {14},
  number    = {1},
  pages     = {1--36},
  year      = {2021},
  url       = {http://www.tdp.cat/issues21/tdp.a417a21.pdf},
  timestamp = {Mon, 03 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/Majedi021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/WangR21,
  author    = {Ziang Wang and
               Jerome P. Reiter},
  title     = {Post-processing Differentially Private Counts to Satisfy Additive
               Constraints},
  journal   = {Trans. Data Priv.},
  volume    = {14},
  number    = {2},
  pages     = {65--77},
  year      = {2021},
  url       = {http://www.tdp.cat/issues21/abs.a433a21.php},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/WangR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CroftSS20,
  author    = {William Lee Croft and
               J{\"{o}}rg{-}R{\"{u}}diger Sack and
               Wei Shi},
  title     = {The Impact of Range Constraints on Utility in the Design of Differentially
               Private Mechanisms},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {3},
  pages     = {171--200},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/abs.a378a19.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/CroftSS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/FioreKZCFHAOQS20,
  author    = {Marco Fiore and
               Panagiota Katsikouli and
               Elli Zavou and
               Mathieu Cunche and
               Fran{\c{c}}oise Fessant and
               Dominique Le Hello and
               Ulrich Matchi A{\"{\i}}vodji and
               Baptiste Olivier and
               Tony Quertier and
               Razvan Stanica},
  title     = {Privacy in trajectory micro-data publishing: a survey},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {2},
  pages     = {91--149},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/tdp.a363a19.pdf},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/FioreKZCFHAOQS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MitraBDTS20,
  author    = {Robin Mitra and
               St{\'{e}}phanie Blanchard and
               Iain Dove and
               Caroline Tudor and
               Keith Spicer},
  title     = {Confidentiality challenges in releasing longitudinally linked data},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {2},
  pages     = {151--170},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/tdp.a369a19.pdf},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MitraBDTS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NanniABBBCCCCCD20,
  author    = {Mirco Nanni and
               Gennady L. Andrienko and
               Albert{-}L{\'{a}}szl{\'{o}} Barab{\'{a}}si and
               Chiara Boldrini and
               Francesco Bonchi and
               Ciro Cattuto and
               Francesca Chiaromonte and
               Giovanni Comand{\'{e}} and
               Marco Conti and
               Mark Cot{\'{e}} and
               Frank Dignum and
               Virginia Dignum and
               Josep Domingo{-}Ferrer and
               Paolo Ferragina and
               Fosca Giannotti and
               Riccardo Guidotti and
               Dirk Helbing and
               Kimmo Kaski and
               J{\'{a}}nos Kert{\'{e}}sz and
               Sune Lehmann and
               Bruno Lepri and
               Paul Lukowicz and
               Stan Matwin and
               David Meg{\'{\i}}as and
               Anna Monreale and
               Katharina Morik and
               Nuria Oliver and
               Andrea Passarella and
               Andrea Passerini and
               Dino Pedreschi and
               Alex Pentland and
               Fabio Pianesi and
               Francesca Pratesi and
               Salvatore Rinzivillo and
               Salvatore Ruggieri and
               Arno Siebes and
               Vicen{\c{c}} Torra and
               Roberto Trasarti and
               Jeroen van den Hoven and
               Alessandro Vespignani},
  title     = {Give more data, awareness and control to individual citizens, and
               they will help {COVID-19} containment},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {1},
  pages     = {61--66},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/tdp.a389a20.pdf},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NanniABBBCCCCCD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NelsonR20,
  author    = {Boel Nelson and
               Jenni Reuben},
  title     = {SoK: Chasing Accuracy and Privacy, and Catching Both in Differentially
               Private Histogram Publication},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {3},
  pages     = {201--245},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/abs.a387a20.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NelsonR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RanbadugeVC20,
  author    = {Thilina Ranbaduge and
               Dinusha Vatsalan and
               Peter Christen},
  title     = {Secure Multi-party Summation Protocols: Are They Secure Enough Under
               Collusion?},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {1},
  pages     = {25--60},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/tdp.a335a18.pdf},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/RanbadugeVC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TaubES20,
  author    = {Jennifer Taub and
               Mark Elliot and
               Joseph W. Sakshaug},
  title     = {The Impact of Synthetic Data Generation on Data Utility with Application
               to the 1991 {UK} Samples of Anonymised Records},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {1},
  pages     = {1--23},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/tdp.a306a18.pdf},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/TaubES20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/WaalC20,
  author    = {Ton de Waal and
               Wieger Coutinho},
  title     = {Solving the Disclosure Auditing Problem for Secondary Cell Suppression
               by Means of Linear Programming},
  journal   = {Trans. Data Priv.},
  volume    = {13},
  number    = {2},
  pages     = {67--90},
  year      = {2020},
  url       = {http://www.tdp.cat/issues16/tdp.a355a19.pdf},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/WaalC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/000619,
  author    = {Fang Liu},
  title     = {Statistical Properties of Sanitized Results from Differentially Private
               Laplace Mechanism with Univariate Bounding Constraints},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {3},
  pages     = {169--195},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/tdp.a316a18.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/000619.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/AmiriYSH19,
  author    = {Fatemeh Amiri and
               Nasser Yazdani and
               Azadeh Shakery and
               Shen{-}Shyang Ho},
  title     = {Bayesian-based Anonymization Framework against Background Knowledge
               Attack in Continuous Data Publishing},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {3},
  pages     = {197--225},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/tdp.a336a18.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/AmiriYSH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BarshapT19,
  author    = {Guy Barshap and
               Tamir Tassa},
  title     = {Privacy-Preserving Planarity Testing of Distributed Graphs},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {2},
  pages     = {117--144},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a338a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/BarshapT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/HomannW19,
  author    = {Daniel Homann and
               Lena Wiese},
  title     = {Inference Attacks on Fuzzy Searchable Encryption Schemes},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {2},
  pages     = {91--115},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a319a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/HomannW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Hu19,
  author    = {Jingchen Hu},
  title     = {Bayesian Estimation of Attribute and Identification Disclosure Risks
               in Synthetic Data},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {1},
  pages     = {61--89},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a313a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Hu19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NettletonES19,
  author    = {David F. Nettleton and
               Vladimir Estivill{-}Castro and
               Juli{\'{a}}n Salas},
  title     = {Privacy in Multiple On-line Social Networks - Re-identification and
               Predictability},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {1},
  pages     = {29--56},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a302a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NettletonES19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/OKeefeC19,
  author    = {Christine M. O'Keefe and
               Anne{-}Sophie Charest},
  title     = {Bootstrap Differential Privacy},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {1},
  pages     = {1--28},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a296a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/OKeefeC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PujolMMT19,
  author    = {Alexandre Pujol and
               Damien Magoni and
               Liam Murphy and
               Christina Thorpe},
  title     = {Spying on Instant Messaging Servers: Potential Privacy Leaks through
               Metadata},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {2},
  pages     = {175--206},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a308a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/PujolMMT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Ritchie19,
  author    = {Felix Ritchie},
  title     = {Analyzing the disclosure risk of regression coefficients},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {2},
  pages     = {145--173},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/abs.a303a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Ritchie19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ShlomoKL19,
  author    = {Natalie Shlomo and
               Thomas Krenzke and
               Jianzhu Li},
  title     = {Comparison of Three Post-tabular Confidentiality Approaches for Survey
               Weighted Frequency Tables},
  journal   = {Trans. Data Priv.},
  volume    = {12},
  number    = {3},
  pages     = {145--168},
  year      = {2019},
  url       = {http://www.tdp.cat/issues16/tdp.a329a18.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/ShlomoKL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BakthaT18,
  author    = {Kiran Baktha and
               B. K. Tripathy},
  title     = {Alpha Anonymization in Social Networks using the Lossy-Join Approach},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {1},
  pages     = {1--22},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a270a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/BakthaT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BringerCML18,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Daniel Le M{\'{e}}tayer and
               Roch Lescuyer},
  title     = {Biometric Systems Private by Design: Reasoning about privacy properties
               of biometric system architectures},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {2},
  pages     = {111--137},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a274a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/BringerCML18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DegitzH18,
  author    = {Alexander Degitz and
               Hannes Hartenstein},
  title     = {{PATCONFDB:} Design and Evaluation of Access Pattern Confidentiality-Preserving
               Indexes},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {2},
  pages     = {81--109},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a291a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/DegitzH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/LinMSM18,
  author    = {Yan{-}Xia Lin and
               Luke Mazur and
               Rathindra Sarathy and
               Krishnamurty Muralidhar},
  title     = {Statistical Information Recovery from Multivariate Noise-Multiplied
               Data, a Computational Approach},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {1},
  pages     = {23--45},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a271a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/LinMSM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MascettiMLB18,
  author    = {Sergio Mascetti and
               Nadia Metoui and
               Andrea Lanzi and
               Claudio Bettini},
  title     = {{EPIC:} a Methodology for Evaluating Privacy Violation Risk in Cybersecurity
               Systems},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {3},
  pages     = {239--277},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/abs.a290a17.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MascettiMLB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MauwRT18,
  author    = {Sjouke Mauw and
               Yunior Ram{\'{\i}}rez{-}Cruz and
               Rolando Trujillo{-}Rasua},
  title     = {Anonymising social graphs in the presence of active attackers},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {2},
  pages     = {169--198},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a285a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/MauwRT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NakagawaAN18,
  author    = {Takuma Nakagawa and
               Hiromi Arai and
               Hiroshi Nakagawa},
  title     = {Personalized Anonymization for Set-Valued Data by Partial Suppression},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {3},
  pages     = {219--237},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/abs.a322a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NakagawaAN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PratesiMTGPY18,
  author    = {Francesca Pratesi and
               Anna Monreale and
               Roberto Trasarti and
               Fosca Giannotti and
               Dino Pedreschi and
               Tadashi Yanagihara},
  title     = {PRUDEnce: a System for Assessing Privacy Risk vs Utility in Data Sharing
               Ecosystems},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {2},
  pages     = {139--167},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a284a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/PratesiMTGPY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RahmanRLM18,
  author    = {Md. Atiqur Rahman and
               Tanzila Rahman and
               Robert Lagani{\`{e}}re and
               Noman Mohammed},
  title     = {Membership Inference Attack against Differentially Private Deep Learning
               Model},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {1},
  pages     = {61--79},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a289a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/RahmanRLM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RebelloT18,
  author    = {Celina Rebello and
               Elaine Tavares},
  title     = {Big Data Privacy Context: Literature Effects On Secure Informational
               Assets},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {3},
  pages     = {199--217},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/abs.a288a17.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/RebelloT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SakumaO18,
  author    = {Jun Sakuma and
               Tatsuya Osame},
  title     = {Recommendation with k-Anonymized Ratings},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {1},
  pages     = {47--60},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/tdp.a279a17.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/SakumaO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/YuR18,
  author    = {Haoyang Yu and
               Jerome P. Reiter},
  title     = {Differentially Private Verification of Regression Predictions from
               Synthetic Data},
  journal   = {Trans. Data Priv.},
  volume    = {11},
  number    = {3},
  pages     = {279--297},
  year      = {2018},
  url       = {http://www.tdp.cat/issues16/abs.a321a18.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/YuR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Ayala-RiveraMCM17,
  author    = {Vanessa Ayala{-}Rivera and
               Patrick McDonagh and
               Thomas Cerqueus and
               Liam Murphy and
               Christina Thorpe},
  title     = {Enhancing the Utility of Anonymized Data by Improving the Quality
               of Generalization Hierarchies},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {1},
  pages     = {27--59},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/tdp.a261a16.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/Ayala-RiveraMCM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BelabedACF17,
  author    = {Amine Belabed and
               Esma A{\"{\i}}meur and
               Mohammed Amine Chikh and
               Hadjila Fethallah},
  title     = {A Privacy-Preserving Approach for Composite Web Service Selection},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {2},
  pages     = {83--115},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/abs.a253a16.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/BelabedACF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/FletcherI17,
  author    = {Sam Fletcher and
               Md Zahidul Islam},
  title     = {Measuring Rule Retention in Anonymized Data - When One Measure Is
               Not Enough},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {3},
  pages     = {175--201},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/abs.a259a16.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/FletcherI17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/JaferMS17,
  author    = {Yasser Jafer and
               Stan Matwin and
               Marina Sokolova},
  title     = {A Multi-dimensional Privacy-aware Evaluation Function in Automatic
               Feature Selection},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {3},
  pages     = {145--174},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/abs.a230a15.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/JaferMS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MancuhanC17,
  author    = {Koray Mancuhan and
               Chris Clifton},
  title     = {Instance-Based Learning with l-diversity},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {3},
  pages     = {203--235},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/abs.a273a17.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MancuhanC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MortazaviJ17,
  author    = {Reza Mortazavi and
               Saeed Jalili},
  title     = {Fine granular proximity breach prevention during numerical data anonymization},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {2},
  pages     = {117--144},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/abs.a268a16.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MortazaviJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/OganianD17,
  author    = {Anna Oganian and
               Josep Domingo{-}Ferrer},
  title     = {Local synthesis for disclosure limitation that satisfies probabilistic
               k-anonymity criterion},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {1},
  pages     = {61--81},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/tdp.a244a16.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/OganianD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ZhangMDH17,
  author    = {Baichuan Zhang and
               Noman Mohammed and
               Vachik S. Dave and
               Mohammad Al Hasan},
  title     = {Feature Selection for Classification under Anonymity Constraint},
  journal   = {Trans. Data Priv.},
  volume    = {10},
  number    = {1},
  pages     = {1--25},
  year      = {2017},
  url       = {http://www.tdp.cat/issues16/tdp.a262a16.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/ZhangMDH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BonomiX16,
  author    = {Luca Bonomi and
               Li Xiong},
  title     = {On Differentially Private Longest Increasing Subsequence Computation
               in Data Stream},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {1},
  pages     = {73--100},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a240a16.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/BonomiX16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ElSalamounyG16,
  author    = {Ehab ElSalamouny and
               S{\'{e}}bastien Gambs},
  title     = {Differential Privacy Models for Location-Based Services},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {1},
  pages     = {15--48},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a220a15.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/ElSalamounyG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NguyenIR16,
  author    = {Hiep H. Nguyen and
               Abdessamad Imine and
               Micha{\"{e}}l Rusinowitch},
  title     = {Network Structure Release under Differential Privacy},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {3},
  pages     = {215--241},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/abs.a248a16.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NguyenIR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PrasserBESKK16,
  author    = {Fabian Prasser and
               Raffael Bild and
               Johanna Eicher and
               Helmut Spengler and
               Florian Kohlmayer and
               Klaus A. Kuhn},
  title     = {Lightning: Utility-Driven Anonymization of High-Dimensional Data},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {2},
  pages     = {161--185},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a223a15.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/PrasserBESKK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RijoFS16,
  author    = {Pedro Rijo and
               Alexandre P. Francisco and
               M{\'{a}}rio J. Silva},
  title     = {Evaluating the impact of k-anonymization on the inference of interaction
               networks},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {1},
  pages     = {49--72},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a251a15.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/RijoFS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RoozgardBVC16,
  author    = {Aminmohammad Roozgard and
               Nafise Barzigar and
               Pramode K. Verma and
               Samuel Cheng},
  title     = {Genomic Data Privacy Protection using Compressed Sensing},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {1},
  pages     = {1--13},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a209a15.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/RoozgardBVC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SarfrazNCB16,
  author    = {Muhammad I. Sarfraz and
               Mohamed Nabeel and
               Jianneng Cao and
               Elisa Bertino},
  title     = {DBMask: Fine-Grained Access Control on Encrypted Relational Databases},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {3},
  pages     = {187--214},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/abs.a231a15.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SarfrazNCB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SeoWB16,
  author    = {Seung{-}Hyun Seo and
               Jongho Won and
               Elisa Bertino},
  title     = {pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation
               Mechanism for a Privacy-Preserving IoT},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {2},
  pages     = {101--130},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a232a15.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/SeoWB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/StrizhovR16,
  author    = {Mikhail Strizhov and
               Indrajit Ray},
  title     = {Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting
               Efficient Multi-user Setup},
  journal   = {Trans. Data Priv.},
  volume    = {9},
  number    = {2},
  pages     = {131--159},
  year      = {2016},
  url       = {http://www.tdp.cat/issues16/tdp.a228a15.pdf},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/StrizhovR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/AmatoM15,
  author    = {Flora Amato and
               Francesco Moscato},
  title     = {A model driven approach to data privacy verification in E-Health systems},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {3},
  pages     = {273--296},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a236a15.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/AmatoM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CampanAT15,
  author    = {Alina Campan and
               Yasmeen Alufaisan and
               Traian Marius Truta},
  title     = {Preserving Communities in Anonymized Social Networks},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {1},
  pages     = {55--87},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a217a15.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/CampanAT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ChakrabortyATP15,
  author    = {Saptarshi Chakraborty and
               John George Ambooken and
               B. K. Tripathy and
               Swarnalatha Purushotham},
  title     = {Analysis and Performance Enhancement to Achieve Recursive (c, l) Diversity
               Anonymization in Social Networks},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {2},
  pages     = {173--215},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a182a14.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/ChakrabortyATP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Dankar15,
  author    = {Fida Kamal Dankar},
  title     = {Privacy Preserving Linear Regression on Distributed Databases},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {1},
  pages     = {3--28},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a215a15.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/Dankar15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GoncalvesGA15,
  author    = {Jo{\~{a}}o M. Gon{\c{c}}alves and
               Diogo Gomes and
               Rui L. Aguiar},
  title     = {Privacy in Data Publishing for Tailored Recommendation Scenarios},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {3},
  pages     = {245--271},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a202a14.pdf},
  timestamp = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/GoncalvesGA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GulyasI15,
  author    = {G{\'{a}}bor Gy{\"{o}}rgy Guly{\'{a}}s and
               S{\'{a}}ndor Imre},
  title     = {Using Identity Separation Against De-anonymization of Social Networks},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {2},
  pages     = {113--140},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a180a14.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/GulyasI15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Kroll15,
  author    = {Martin Kr{\"{o}}ll},
  title     = {A graph theoretic linkage attack on microdata in a metric space},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {3},
  pages     = {217--243},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a170a14.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/Kroll15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MicheliMA15,
  author    = {Eirini C. Micheli and
               Giorgos Margaritis and
               Stergios V. Anastasiadis},
  title     = {Permission-based Index Clustering for Secure Multi-User Search},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {1},
  pages     = {29--53},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a216a15.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/MicheliMA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PullsS15,
  author    = {Tobias Pulls and
               Daniel Slamanig},
  title     = {On the Feasibility of (Practical) Commercial Anonymous Cloud Storage},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {2},
  pages     = {89--111},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a164a14.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/PullsS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SamanthulaCJS15,
  author    = {Bharath K. Samanthula and
               Lei Cen and
               Wei Jiang and
               Luo Si},
  title     = {Privacy-Preserving and Efficient Friend Recommendation in Online Social
               Networks},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {2},
  pages     = {141--171},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a147a13.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/SamanthulaCJS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TrutaXF15,
  author    = {Traian Marius Truta and
               Li Xiong and
               Farshad Fotouhi},
  title     = {Foreword for the special issue of selected papers from the 7th {EDBT/ICDT}
               Workshop on Privacy and Anonymity in Information Society {(PAIS} 2014)},
  journal   = {Trans. Data Priv.},
  volume    = {8},
  number    = {1},
  pages     = {1--2},
  year      = {2015},
  url       = {http://www.tdp.cat/issues11/tdp.a214a15.pdf},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdp/TrutaXF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Ayala-RiveraMCM14,
  author    = {Vanessa Ayala{-}Rivera and
               Patrick McDonagh and
               Thomas Cerqueus and
               Liam Murphy},
  title     = {A Systematic Comparison and Evaluation of k-Anonymization Algorithms
               for Practitioners},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {3},
  pages     = {337--370},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a169a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Ayala-RiveraMCM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/FanCLC14,
  author    = {Chun{-}I Fan and
               Ming{-}Te Chen and
               Yu{-}Kuang Liang and
               Long{-}Sian Chen},
  title     = {Truly Anonymous Paper Submission and Review Scheme},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {3},
  pages     = {283--308},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a163a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/FanCLC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MascettiBB14,
  author    = {Sergio Mascetti and
               Letizia Bertolaja and
               Claudio Bettini},
  title     = {SafeBox: adaptable spatio-temporal generalization for location privacy
               protection},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {2},
  pages     = {131--163},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a193a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MascettiBB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NabeelB14,
  author    = {Mohamed Nabeel and
               Elisa Bertino},
  title     = {Attribute Based Group Key Management},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {3},
  pages     = {309--336},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a165a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NabeelB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ParkG14,
  author    = {Yubin Park and
               Joydeep Ghosh},
  title     = {PeGS: Perturbed Gibbs Samplers that Generate Privacy-Compliant Synthetic
               Data},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {3},
  pages     = {253--282},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a154a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/ParkG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PoulisSLG14,
  author    = {Giorgos Poulis and
               Spiros Skiadopoulos and
               Grigorios Loukides and
               Aris Gkoulalas{-}Divanis},
  title     = {Apriori-based algorithms for k\({}^{\mbox{m}}\)-anonymizing trajectory
               data},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {2},
  pages     = {165--194},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a194a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/PoulisSLG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Ruggieri14,
  author    = {Salvatore Ruggieri},
  title     = {Using t-closeness anonymity to control for non-discrimination},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {2},
  pages     = {99--129},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a196a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Ruggieri14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SazonovaM14,
  author    = {Vera Sazonova and
               Stan Matwin},
  title     = {Combining Binary Classifiers for a Multiclass Problem with Differential
               Privacy},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {1},
  pages     = {51--70},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a172a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SazonovaM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ShebaroOMB14,
  author    = {Bilal Shebaro and
               Oyindamola Oluwatimi and
               Daniele Midi and
               Elisa Bertino},
  title     = {IdentiDroid: Android can finally Wear its Anonymous Suit},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {1},
  pages     = {27--50},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a150a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/ShebaroOMB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/StuderW14,
  author    = {Thomas Studer and
               Johannes Werner},
  title     = {Censors for Boolean Description Logic},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {3},
  pages     = {223--252},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a138a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/StuderW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SunYKF14,
  author    = {Chong{-}Jing Sun and
               Philip S. Yu and
               Xiangnan Kong and
               Yan Fu},
  title     = {Privacy Preserving Social Network Publication Against Mutual Friend
               Attacks},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {2},
  pages     = {71--97},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a195a14.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SunYKF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/XiaoXFGL14,
  author    = {Yonghui Xiao and
               Li Xiong and
               Liyue Fan and
               Slawomir Goryczka and
               Haoran Li},
  title     = {DPCube: Differentially Private Histogram Release through Multidimensional
               Partitioning},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {3},
  pages     = {195--222},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a136a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/XiaoXFGL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ZhangR0V14,
  author    = {Dana Zhang and
               Kotagiri Ramamohanarao and
               Rui Zhang and
               Steven Versteeg},
  title     = {Efficient Graph Based Approach to Large Scale Role Engineering},
  journal   = {Trans. Data Priv.},
  volume    = {7},
  number    = {1},
  pages     = {1--26},
  year      = {2014},
  url       = {http://www.tdp.cat/issues11/abs.a115a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/ZhangR0V14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/0009W13,
  author    = {Yue Wang and
               Xintao Wu},
  title     = {Preserving Differential Privacy in Degree-Correlation based Graph
               Generation},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {2},
  pages     = {127--145},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a113a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/0009W13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BabuRKEJ13,
  author    = {Korra Sathya Babu and
               Nithin Reddy and
               Nitesh Kumar and
               Mark Elliot and
               Sanjay Kumar Jena},
  title     = {Achieving k-anonymity Using Improved Greedy Heuristics for Very Large
               Relational Databases},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {1},
  pages     = {1--17},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a100a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/BabuRKEJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CliftonT13,
  author    = {Chris Clifton and
               Tamir Tassa},
  title     = {On Syntactic Anonymity and Differential Privacy},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {2},
  pages     = {161--183},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a124a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/CliftonT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DankarE13,
  author    = {Fida Kamal Dankar and
               Khaled El Emam},
  title     = {Practicing Differential Privacy in Health Care: {A} Review},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {1},
  pages     = {35--67},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a129a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/DankarE13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/HoR13,
  author    = {Shen{-}Shyang Ho and
               Shuhua Ruan},
  title     = {Preserving Privacy for Interesting Location Pattern Mining from Trajectory
               Data},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {1},
  pages     = {87--106},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a131a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/HoR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/JiangJWMCO13,
  author    = {Xiaoqian Jiang and
               Zhanglong Ji and
               Shuang Wang and
               Noman Mohammed and
               Samuel Cheng and
               Lucila Ohno{-}Machado},
  title     = {Differential-Private Data Publishing Through Component Analysis},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {1},
  pages     = {19--34},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a109a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/JiangJWMCO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/LiuXL13,
  author    = {Jinfei Liu and
               Li Xiong and
               Jun Luo},
  title     = {Semantic Security: Privacy Definitions Revisited},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {3},
  pages     = {185--198},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a155a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/LiuXL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/LiuXLH13,
  author    = {Jinfei Liu and
               Li Xiong and
               Jun Luo and
               Joshua Zhexue Huang},
  title     = {Privacy Preserving Distributed {DBSCAN} Clustering},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {1},
  pages     = {69--85},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a130a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/LiuXLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MasoumzadehJ13,
  author    = {Amirreza Masoumzadeh and
               James Joshi},
  title     = {Top Location Anonymization for Geosocial Network Datasets},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {1},
  pages     = {107--126},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a132a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MasoumzadehJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MeindlT13,
  author    = {Bernhard Meindl and
               Matthias Templ},
  title     = {Analysis of Commercial and Free and Open Source Solvers for the Cell
               Suppression Problem},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {2},
  pages     = {147--159},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a114a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MeindlT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RaoCKBK13,
  author    = {Fang{-}Yu Rao and
               Jianneng Cao and
               Mehmet Kuzu and
               Elisa Bertino and
               Murat Kantarcioglu},
  title     = {Efficient Tree Pattern Queries On Encrypted {XML} Documents},
  journal   = {Trans. Data Priv.},
  volume    = {6},
  number    = {3},
  pages     = {199--226},
  year      = {2013},
  url       = {http://www.tdp.cat/issues11/abs.a156a13.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/RaoCKBK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/AimeurBGS12,
  author    = {Esma A{\"{\i}}meur and
               Gilles Brassard and
               S{\'{e}}bastien Gambs and
               David Sch{\"{o}}nfeld},
  title     = {{P3ERS:} Privacy-Preserving PEer Review System},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {3},
  pages     = {553--578},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a103a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/AimeurBGS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/AnandanCJMPS12,
  author    = {Balamurugan Anandan and
               Chris Clifton and
               Wei Jiang and
               Mummoorthy Murugesan and
               Pedro Pastrana{-}Camacho and
               Luo Si},
  title     = {t-Plausibility: Generalizing Words to Desensitize Text},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {3},
  pages     = {505--534},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a095a12.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/AnandanCJMPS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GanapathyTFGM12,
  author    = {Vignesh Ganapathy and
               Dilys Thomas and
               Tom{\'{a}}s Feder and
               Hector Garcia{-}Molina and
               Rajeev Motwani},
  title     = {Distributing Data for Secure Database Services},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {1},
  pages     = {253--272},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a089a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GanapathyTFGM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Gkoulalas-DivanisL12,
  author    = {Aris Gkoulalas{-}Divanis and
               Grigorios Loukides},
  title     = {Utility-guided Clustering-based Transaction Data Anonymization},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {1},
  pages     = {223--251},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a083a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Gkoulalas-DivanisL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/HawashinFTG12,
  author    = {Bilal Hawashin and
               Farshad Fotouhi and
               Traian Marius Truta and
               William I. Grosky},
  title     = {Efficient Privacy Preserving Protocols for Similarity Join},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {1},
  pages     = {297--331},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a090a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/HawashinFTG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/JagannathanPW12,
  author    = {Geetha Jagannathan and
               Krishnan Pillaipakkamnatt and
               Rebecca N. Wright},
  title     = {A Practical Differentially Private Random Decision Tree Classifier},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {1},
  pages     = {273--295},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a082a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/JagannathanPW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/McClureR12,
  author    = {David McClure and
               Jerome P. Reiter},
  title     = {Differential Privacy and Statistical Disclosure Risk Measures: An
               Investigation with Binary Synthetic Data},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {3},
  pages     = {535--552},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a093a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/McClureR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Merener12,
  author    = {Martin M. Merener},
  title     = {Theoretical Results on De-Anonymization via Linkage Attacks},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {2},
  pages     = {377--402},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a074a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Merener12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MortonMGY12,
  author    = {Stuart Morton and
               Malika Mahoui and
               P. Joseph Gibson and
               Saidaiah Yechuri},
  title     = {An Enhanced Utility-Driven Data Anonymization Method},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {2},
  pages     = {469--503},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a067a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MortonMGY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/OKeefeS12,
  author    = {Christine M. O'Keefe and
               Natalie Shlomo},
  title     = {Comparison of Remote Analysis with Statistical Disclosure Control
               for Protecting the Confidentiality of Business Data},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {2},
  pages     = {403--432},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a071a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/OKeefeS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/StennethYW12,
  author    = {Leon Stenneth and
               Philip S. Yu},
  title     = {Mobile Systems Privacy: 'MobiPriv' {A} Robust System for Snapshot
               or Continuous Querying Location Based Mobile Systems},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {1},
  pages     = {333--376},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a063a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/StennethYW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TassaMG12,
  author    = {Tamir Tassa and
               Arnon Mazza and
               Aristides Gionis},
  title     = {k-Concealment: An Alternative Model of k-Type Anonymity},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {1},
  pages     = {189--222},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a069a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/TassaMG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TianZXS12,
  author    = {Hongwei Tian and
               Weining Zhang and
               Shouhuai Xu and
               Patrick Sharkey},
  title     = {A Knowledge Model Sharing Based Approach to Privacy-Preserving Data
               Mining},
  journal   = {Trans. Data Priv.},
  volume    = {5},
  number    = {2},
  pages     = {433--467},
  year      = {2012},
  url       = {http://www.tdp.cat/issues11/abs.a081a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/TianZXS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BurghardtBGC11,
  author    = {Thorben Burghardt and
               Klemens B{\"{o}}hm and
               Achim Guttmann and
               Chris Clifton},
  title     = {Anonymous Search Histories Featuring Personalized Advertisement -
               Balancing Privacy with Economic Interests},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {1},
  pages     = {31--50},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a055a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/BurghardtBGC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CroftO11,
  author    = {Neil J. Croft and
               Martin S. Olivier},
  title     = {Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive
               Contract},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {1},
  pages     = {19--30},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a040a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/CroftO11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Damiani11,
  author    = {Maria Luisa Damiani},
  title     = {Third party geolocation services in {LBS:} privacy requirements and
               research issues},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {2},
  pages     = {55--72},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a076a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Damiani11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GambsKC11,
  author    = {S{\'{e}}bastien Gambs and
               Marc{-}Olivier Killijian and
               Miguel N{\'{u}}{\~{n}}ez del Prado Cortez},
  title     = {Show Me How You Move and {I} Will Tell You Who You Are},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {2},
  pages     = {103--126},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a078a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GambsKC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GavinVA11,
  author    = {G{\'{e}}rald Gavin and
               Julien Velcin and
               Philippe Aubertin},
  title     = {Privacy Preserving Aggregation of Secret Classifiers},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {3},
  pages     = {167--187},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a088a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GavinVA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Gkoulalas-DivanisSV11,
  author    = {Aris Gkoulalas{-}Divanis and
               Y{\"{u}}cel Saygin and
               Vassilios S. Verykios},
  title     = {Foreword for the special issue of selected papers from the 1st {ECML/PKDD}
               Workshop on Privacy and Security issues in Data Mining and Machine
               Learning},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {3},
  pages     = {127--128},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a085a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Gkoulalas-DivanisSV11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GrosskreutzLR11,
  author    = {Henrik Grosskreutz and
               Benedikt Lemmen and
               Stefan R{\"{u}}ping},
  title     = {Secure Distributed Subgroup Discovery in Horizontally Partitioned
               Data},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {3},
  pages     = {147--165},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a087a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GrosskreutzLR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MonrealeTPRB11,
  author    = {Anna Monreale and
               Roberto Trasarti and
               Dino Pedreschi and
               Chiara Renso and
               Vania Bogorny},
  title     = {C-safety: a framework for the anonymization of semantic trajectories},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {2},
  pages     = {73--101},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a077a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MonrealeTPRB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PathakR11,
  author    = {Manas A. Pathak and
               Bhiksha Raj},
  title     = {Efficient Protocols for Principal Eigenvector Computation over Private
               Data},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {3},
  pages     = {129--146},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a086a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/PathakR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SarathyM11,
  author    = {Rathindra Sarathy and
               Krishnamurty Muralidhar},
  title     = {Evaluating Laplace Noise Addition to Satisfy Differential Privacy
               for Numeric Data},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {1},
  pages     = {1--17},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a064a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SarathyM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SayginD11,
  author    = {Y{\"{u}}cel Saygin and
               Maria Luisa Damiani},
  title     = {Foreword for the special issue of selected papers from the 3rd {ACM}
               {SIGSPATIAL} Workshop on Security and Privacy in {GIS} and {LBS}},
  journal   = {Trans. Data Priv.},
  volume    = {4},
  number    = {2},
  pages     = {51--53},
  year      = {2011},
  url       = {http://www.tdp.cat/issues11/abs.a075a11.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SayginD11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Bezzi10,
  author    = {Michele Bezzi},
  title     = {An information theoretic approach for privacy metrics},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {3},
  pages     = {199--215},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a059a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Bezzi10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CaiolaR10,
  author    = {Gregory Caiola and
               Jerome P. Reiter},
  title     = {Random Forests for Generating Partially Synthetic, Categorical Data},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {1},
  pages     = {27--42},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a033a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/CaiolaR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CampanTC10,
  author    = {Alina Campan and
               Traian Marius Truta and
               Nicholas Cooper},
  title     = {P-Sensitive K-Anonymity with Generalization Constraints},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {2},
  pages     = {65--89},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a035a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/CampanTC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DaalmansW10,
  author    = {Jacco Daalmans and
               Ton de Waal},
  title     = {An Improved Formulation of the Disclosure Auditing Problem for Secondary
               Cell Suppression},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {3},
  pages     = {217--251},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a043a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/DaalmansW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DamianiBS10,
  author    = {Maria Luisa Damiani and
               Elisa Bertino and
               Claudio Silvestri},
  title     = {The {PROBE} Framework for the Personalized Cloaking of Private Locations},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {2},
  pages     = {123--148},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a044a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/DamianiBS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DeswarteG10,
  author    = {Yves Deswarte and
               S{\'{e}}bastien Gambs},
  title     = {A Proposal for a Privacy-preserving National Identity Card},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {3},
  pages     = {253--276},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a060a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/DeswarteG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GoldbergerT10,
  author    = {Jacob Goldberger and
               Tamir Tassa},
  title     = {Efficient Anonymizations with Enhanced Utility},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {2},
  pages     = {149--175},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a047a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GoldbergerT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/JagannathanPWU10,
  author    = {Geetha Jagannathan and
               Krishnan Pillaipakkamnatt and
               Rebecca N. Wright and
               Daryl Umano},
  title     = {Communication-Efficient Privacy-Preserving Clustering},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {1},
  pages     = {1--25},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a028a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/JagannathanPWU10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MedienMBKBT10,
  author    = {Zeghid Medien and
               Mohsen Machhout and
               Belgacem Bouallegue and
               Lazhar Khriji and
               Adel Baganne and
               Rached Tourki},
  title     = {Design and Hardware Implementation of QoSS - {AES} Processor for Multimedia
               applications},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {1},
  pages     = {43--64},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a029a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MedienMBKBT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MonrealeAAGPRW10,
  author    = {Anna Monreale and
               Gennady L. Andrienko and
               Natalia V. Andrienko and
               Fosca Giannotti and
               Dino Pedreschi and
               Salvatore Rinzivillo and
               Stefan Wrobel},
  title     = {Movement Data Anonymity through Generalization},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {2},
  pages     = {91--121},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a045a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MonrealeAAGPRW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TsukadaMSK10,
  author    = {Yasuyuki Tsukada and
               Ken Mano and
               Hideki Sakurada and
               Yoshinobu Kawabe},
  title     = {Anonymity, Privacy, Onymity, and Identity: {A} Modal Logic Approach},
  journal   = {Trans. Data Priv.},
  volume    = {3},
  number    = {3},
  pages     = {177--198},
  year      = {2010},
  url       = {http://www.tdp.cat/issues/abs.a039a10.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/TsukadaMSK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BertinoD09,
  author    = {Elisa Bertino and
               Maria Luisa Damiani},
  title     = {Foreword for the special issue of selected papers from the 1st {ACM}
               {SIGSPATIAL} Workshop on Security and Privacy in {GIS} and {LBS}},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {1},
  pages     = {1--2},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a017a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/BertinoD09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Ghinita09,
  author    = {Gabriel Ghinita},
  title     = {Private Queries and Trajectory Anonymization: a Dual Perspective on
               Location Privacy},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {1},
  pages     = {3--19},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a018a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Ghinita09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GuoW09,
  author    = {Ling Guo and
               Xintao Wu},
  title     = {Privacy Preserving Categorical Data Analysis with Unknown Distortion
               Parameters},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {3},
  pages     = {185--205},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a025a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GuoW09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/LebanonSFB09,
  author    = {Guy Lebanon and
               Monica Scannapieco and
               Mohamed R. Fouad and
               Elisa Bertino},
  title     = {Beyond k-Anonymity: {A} Decision Theoretic Framework for Assessing
               Privacy Risk},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {3},
  pages     = {153--183},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a014a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/LebanonSFB09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/LinBCP09,
  author    = {Dan Lin and
               Elisa Bertino and
               Reynold Cheng and
               Sunil Prabhakar},
  title     = {Location Privacy in Moving-Object Environments},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {1},
  pages     = {21--46},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a019a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/LinBCP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MelchorD09,
  author    = {Carlos Aguilar Melchor and
               Yves Deswarte},
  title     = {Trustable Relays for Anonymous Communication},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {2},
  pages     = {101--130},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a016a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MelchorD09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NergizASG09,
  author    = {Mehmet Ercan Nergiz and
               Maurizio Atzori and
               Y{\"{u}}cel Saygin and
               Baris G{\"{u}}{\c{c}}},
  title     = {Towards Trajectory Anonymization: a Generalization-Based Approach},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {1},
  pages     = {47--75},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a020a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NergizASG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NojimaK09,
  author    = {Ryo Nojima and
               Youki Kadobayashi},
  title     = {Cryptographically Secure Bloom-Filters},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {2},
  pages     = {131--139},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a015a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/NojimaK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PoolsappasitR09,
  author    = {Nayot Poolsappasit and
               Indrakshi Ray},
  title     = {Towards Achieving Personalized Privacy for Location-Based Services},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {1},
  pages     = {77--99},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a021a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/PoolsappasitR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/RamasamyM09,
  author    = {Rajaram Ramasamy and
               Amutha Prabakar Muniyandi},
  title     = {New Remote Mutual Authentication Scheme using Smart Cards},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {2},
  pages     = {141--152},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a012a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/RamasamyM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TemplP09,
  author    = {Matthias Templ and
               Thomas Petelin},
  title     = {A Graphical User Interface for Microdata Protection Which Provides
               Reproducibility and Interactions: the sdcMicro {GUI}},
  journal   = {Trans. Data Priv.},
  volume    = {2},
  number    = {3},
  pages     = {207--224},
  year      = {2009},
  url       = {http://www.tdp.cat/issues/abs.a030a09.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/TemplP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Bras-AmorosD08,
  author    = {Maria Bras{-}Amor{\'{o}}s and
               Josep Domingo{-}Ferrer},
  title     = {On Overlappings of Digitized Straight Lines and Shared Steganographic
               File Systems},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {3},
  pages     = {131--139},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a011a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Bras-AmorosD08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DrechslerBR08,
  author    = {J{\"{o}}rg Drechsler and
               Stefan Bender and
               Susanne R{\"{a}}ssler},
  title     = {Comparing Fully and Partially Synthetic Datasets for Statistical Disclosure
               Control in the German {IAB} Establishment Panel},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {3},
  pages     = {105--130},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a006a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/DrechslerBR08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GeethaSK08,
  author    = {S. Geetha and
               Siva S. Sivatha Sindhu and
               N. Kamaraj},
  title     = {Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis
               for {LSB} Embedding in Digital Images},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {3},
  pages     = {140--161},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a007a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/GeethaSK08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/LaneHM08,
  author    = {Julia Lane and
               Pascal Heus and
               Tim Mulcahy},
  title     = {Data Access in a Cyber World: Making Use of Cyberinfrastructure},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {1},
  pages     = {2--16},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a002a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/LaneHM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MuralidharS08,
  author    = {Krishnamurty Muralidhar and
               Rathindra Sarathy},
  title     = {Generating Sufficiency-based Non-Synthetic Perturbed Data},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {1},
  pages     = {17--33},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a005a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/MuralidharS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SmithE08,
  author    = {Duncan Smith and
               Mark Elliot},
  title     = {A Measure of Disclosure Risk for Tables of Counts},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {1},
  pages     = {34--52},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a003a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SmithE08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/SunWLT08,
  author    = {Xiaoxun Sun and
               Hua Wang and
               Jiuyong Li and
               Traian Marius Truta},
  title     = {Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data
               Publishing},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {2},
  pages     = {53--66},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a001a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/SunWLT08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Templ08,
  author    = {Matthias Templ},
  title     = {Statistical Disclosure Control for Microdata Using the R-Package sdcMicro},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {2},
  pages     = {67--85},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a004a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Templ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/Torra08,
  author    = {Vicen{\c{c}} Torra},
  title     = {Constrained Microaggregation: Adding Constraints for Data Editing},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {2},
  pages     = {86--104},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a010a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/Torra08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TorraD08,
  author    = {Vicen{\c{c}} Torra and
               Josep Domingo{-}Ferrer},
  title     = {Editorial},
  journal   = {Trans. Data Priv.},
  volume    = {1},
  number    = {1},
  pages     = {1},
  year      = {2008},
  url       = {http://www.tdp.cat/issues/abs.a008a08.php},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdp/TorraD08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics