Author of the publication

Fake Injection Strategies for Private Phonetic Matching.

, , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 9-24. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TAILOR: A Record Linkage Tool Box., , and . ICDE, page 17-28. IEEE Computer Society, (2002)A network aware privacy model for online requests in trajectory data., , and . Data Knowl. Eng., 68 (4): 431-452 (2009)Uncertainty for Privacy and 2-Dimensional Range Query Distortion., , , and . JCSE, 5 (3): 210-222 (2011)Efficient Record Linkage Using a Compact Hamming Space., , , and . EDBT, page 209-220. OpenProceedings.org, (2016)Foreword for the special issue of selected papers from the 1st ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning., , and . Trans. Data Privacy, 4 (3): 127-128 (2011)An Integer Linear Programming Scheme to Sanitize Sensitive Frequent Itemsets., , , and . ICTAI, page 771-775. IEEE Computer Society, (2014)Services-based data management in a global computing environment., , and . WISE Workshops, page 45-53. IEEE Computer Society, (2003)Duplicate Record Detection: A Survey., , and . IEEE Trans. Knowl. Data Eng., 19 (1): 1-16 (2007)Fast schemes for online record linkage., , and . Data Min. Knowl. Discov., 32 (5): 1229-1250 (2018)Challenges for privacy preservation in data integration., , and . J. Data and Information Quality, 5 (1-2): 4:1-4:3 (2014)