You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

15 lines
1.1 KiB

## Privacy
* [k-ANONYMITY: A model for Protecting Privacy (1998)](https://epic.org/wp-content/uploads/privacy/reidentification/Sweeney_Article.pdf)
* [Differential Privacy(2006)](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/dwork.pdf)
* [Robust De-anonymization of Large Sparse Datasets(2008)](https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf)
* [Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization(2010)](https://www.uclalawreview.org/broken-promises-of-privacy-responding-to-the-surprising-failure-of-anonymization-2/)
* [Timing Attacks on Web Privacy(2000)](https://www.cs.jhu.edu/~fabian/courses/CS600.424/course_papers/webtiming.pdf)
* [Protecting Browser State from Web Privacy Attacks(2006)](https://crypto.stanford.edu/sameorigin/sameorigin.pdf)
* [KHyperLogLog: Estimating Reidentifiability and
Joinability of Large Data at Scale(2019)](https://storage.googleapis.com/pub-tools-public-publication-data/pdf/40bc2804cbd3e41ed28dc8991316361eca48630c.pdf)
### Other Sources
* [Privacy Papers for Visual Data](https://github.com/brighter-ai/awesome-privacy-papers)