Results 331 to 340 of about 695,630 (383)
Some of the next articles are maybe not open access.
2007
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly ...
V. Ciriani +3 more
openaire +2 more sources
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly ...
V. Ciriani +3 more
openaire +2 more sources
Interpretations of Online Anonymity in Alcoholics Anonymous and Narcotics Anonymous
Proceedings of the ACM on Human-Computer Interaction, 2017How do individuals in twelve-step fellowships like Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) interpret and enact "anonymity?" In this paper, we answer this question through a mixed-methods investigation. Through secondary analysis of interview data from 26 participants and an online questionnaire (N=285) we found three major ...
Sabirat Rubya, Svetlana Yarosh
openaire +1 more source
Post-Quantum Anonymity of Kyber
IACR Cryptology ePrint Archive, 2022Varun Maram, Keita Xagawa
semanticscholar +1 more source
Anonymity and Alcoholics Anonymous-Reply
JAMA: The Journal of the American Medical Association, 1983In Reply.— The program and principles of AA are explained in detail in the book, Alcoholics Anonymous , 1 in which may be found the "Twelve Steps" and "Twelve Traditions." Tradition 11 states: "Our public relations policy is based on attraction rather than promotion; we need always maintain personal anonymity at the level of press, radio and films ...
openaire +1 more source
ACM SIGSPATIAL International Workshop on Advances in Geographic Information Systems, 2020
Robert J. Griffin
semanticscholar +1 more source
Robert J. Griffin
semanticscholar +1 more source
Data anonymization: k-anonymity and de-anonymization attacks
2017Η ανάγκη για πρόσβαση σε δεδομένα που αφορούν πολίτες ολοένα αυξάνεται τα τελευταία χρόνια. Αυτά τα δεδομένα μπορεί να έχουν συλλεχθεί από κυβερνήσεις ή επιχειρήσεις για διάφορους σκοπούς και λόγους. Παρόλα αυτά η δημοσίευση των δεδομένων μπορεί να προκαλέσει διάφορα θέματα εάν δεν ληφθούν κατάλληλα μέτρα.
openaire +1 more source
International Law Reports, 1967
Treaties — Interpretation of — Principles and rules of interpretation — United Nations Headquarters Agreement — Immunity of foreign Ambassador to United Nations under — Application to paternity proceeding — Interpretation of courts of United States of America.Diplomatic and consular intercourse and privileges — Representatives accredited to United ...
openaire +1 more source
Treaties — Interpretation of — Principles and rules of interpretation — United Nations Headquarters Agreement — Immunity of foreign Ambassador to United Nations under — Application to paternity proceeding — Interpretation of courts of United States of America.Diplomatic and consular intercourse and privileges — Representatives accredited to United ...
openaire +1 more source
Achieving k-Anonymity Privacy Protection Using Generalization and Suppression
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002L. Sweeney
semanticscholar +1 more source
Scalable and redactable blockchain with update and anonymity
Information Sciences, 2021Ke Huang +4 more
semanticscholar +1 more source

