© Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/The technical contents of this work fall within the statistical disclosure control (SDC) field, which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive personal information, in order to effectively safeguard the anonymity of the participating respondents. A widely known technique to solve the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers is the k-anonymous microaggregation. Unfortunately, most microaggregation algorithms that produce competitively low levels of distortions exhib...
This research proposal addresses fundamental challenges in privacy-enhancing technologies, related t...
Data privacy is a very important topic and there are several techniques that aim to provide it. The ...
Microaggregation is one of the most commonly employed microdata protection methods. The basic idea o...
© Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://crea...
Improvements in technology have led to enormous volumes of detailed personal information made availa...
© . This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommo...
© Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://crea...
We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering...
In recent years, there has been an alarming increase of online identity theft and attacks using pers...
In recent years, there has been an alarming increase of online identity theft and attacks using pers...
En enquestes i votacions electròniques és necessari garantir l'anonimat de les persones que hi parti...
�������-Anonymous microaggregation emerges as an essential building block in statistical disclosure ...
In microdata releases, main task is to protect the privacy of data subjects. Microaggregation techni...
n the era of big data, the availability of massive amounts of information makes privacy protection m...
The technical contents of this paper fall within the field of statistical disclosure control (SDC), ...
This research proposal addresses fundamental challenges in privacy-enhancing technologies, related t...
Data privacy is a very important topic and there are several techniques that aim to provide it. The ...
Microaggregation is one of the most commonly employed microdata protection methods. The basic idea o...
© Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://crea...
Improvements in technology have led to enormous volumes of detailed personal information made availa...
© . This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommo...
© Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://crea...
We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering...
In recent years, there has been an alarming increase of online identity theft and attacks using pers...
In recent years, there has been an alarming increase of online identity theft and attacks using pers...
En enquestes i votacions electròniques és necessari garantir l'anonimat de les persones que hi parti...
�������-Anonymous microaggregation emerges as an essential building block in statistical disclosure ...
In microdata releases, main task is to protect the privacy of data subjects. Microaggregation techni...
n the era of big data, the availability of massive amounts of information makes privacy protection m...
The technical contents of this paper fall within the field of statistical disclosure control (SDC), ...
This research proposal addresses fundamental challenges in privacy-enhancing technologies, related t...
Data privacy is a very important topic and there are several techniques that aim to provide it. The ...
Microaggregation is one of the most commonly employed microdata protection methods. The basic idea o...