Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "value privacy"
@article{DBLP:journals/access/LiuZZH24a, author = {Chao Liu and Zhaolong Zhi and Weinan Zhao and Zhicheng He}, title = {Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition Technology}, journal = {{IEEE} Access}, volume = {12}, pages = {28417--28436}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3367996}, doi = {10.1109/ACCESS.2024.3367996}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuZZH24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ZhangCGWK24, author = {Xiao{-}Yu Zhang and Jos{\'{e}}{-}Rodrigo C{\'{o}}rdoba{-}Pach{\'{o}}n and Peiqian Guo and Chris Watkins and Stefanie Kuenzel}, title = {Privacy-Preserving Federated Learning for Value-Added Service Model in Advanced Metering Infrastructure}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {1}, pages = {117--131}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2022.3204361}, doi = {10.1109/TCSS.2022.3204361}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcss/ZhangCGWK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TihanyiBBR24, author = {Norbert Tihanyi and Tam{\'{a}}s Bisztray and Bertalan Borsos and Sebastien Raveau}, title = {Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2981--2996}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356162}, doi = {10.1109/TIFS.2024.3356162}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TihanyiBBR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuCXWZ24, author = {Youwen Zhu and Yiran Cao and Qiao Xue and Qihui Wu and Yushu Zhang}, title = {Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {414--426}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324726}, doi = {10.1109/TIFS.2023.3324726}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuCXWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconference/ChenY24, author = {Xiaoyu Chen and Ruoxi Yang}, editor = {Isaac Sserwanga and Hideo Joho and Jie Ma and Preben Hansen and Dan Wu and Masanori Koizumi and Anne J. Gilliland}, title = {Understanding Users' Decision-Making on Privacy Disclosure from a Configurational Perspective Perceived Values, Privacy Concerns, Cognitive Style, and Trust}, booktitle = {Wisdom, Well-Being, Win-Win - 19th International Conference, iConference 2024, Changchun, China, April 15-26, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14596}, pages = {96--105}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57850-2\_8}, doi = {10.1007/978-3-031-57850-2\_8}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconference/ChenY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/anor/DuanXH23, author = {Yongrui Duan and Yuncong Xie and Yihong Hu}, title = {The value of personal information in vertically differentiated markets with privacy concerns}, journal = {Ann. Oper. Res.}, volume = {329}, number = {1}, pages = {425--469}, year = {2023}, url = {https://doi.org/10.1007/s10479-020-03794-3}, doi = {10.1007/S10479-020-03794-3}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/anor/DuanXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/WangMTS23, author = {Lei Wang and Ian R. Manchester and Jochen Trumpf and Guodong Shi}, title = {Differential initial-value privacy and observability of linear dynamical systems}, journal = {Autom.}, volume = {148}, pages = {110722}, year = {2023}, url = {https://doi.org/10.1016/j.automatica.2022.110722}, doi = {10.1016/J.AUTOMATICA.2022.110722}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/automatica/WangMTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LiuLCL23, author = {Huan Liu and Kai Li and Yan Chen and Xin (Robert) Luo}, title = {Is personally identifiable information really more valuable? Evidence from consumers' willingness-to-accept valuation of their privacy information}, journal = {Decis. Support Syst.}, volume = {173}, pages = {114010}, year = {2023}, url = {https://doi.org/10.1016/j.dss.2023.114010}, doi = {10.1016/J.DSS.2023.114010}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LiuLCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/WuRPYG23, author = {Haonan Wu and Ruisheng Ran and Shunshun Peng and Mengmeng Yang and Taolin Guo}, title = {Mining frequent items from high-dimensional set-valued data under local differential privacy protection}, journal = {Expert Syst. Appl.}, volume = {234}, pages = {121105}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.121105}, doi = {10.1016/J.ESWA.2023.121105}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/WuRPYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhuHNZXDJ23, author = {Kun Zhu and Lu Huang and Jiangtian Nie and Yang Zhang and Zehui Xiong and Hong{-}Ning Dai and Jiangming Jin}, title = {Privacy-Aware Double Auction With Time-Dependent Valuation for Blockchain-Based Dynamic Spectrum Sharing in IoT Systems}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {8, April 15}, pages = {6756--6768}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3165819}, doi = {10.1109/JIOT.2022.3165819}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhuHNZXDJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhuTYFP23, author = {Hui Zhu and Xiaohu Tang and Laurence Tianruo Yang and Chao Fu and Shuangrong Peng}, title = {Key-value data collection and statistical analysis with local differential privacy}, journal = {Inf. Sci.}, volume = {640}, pages = {119058}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119058}, doi = {10.1016/J.INS.2023.119058}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhuTYFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SeiOOO23, author = {Yuichi Sei and J. Andrew Onesimu and Hiroshi Okumura and Akihiko Ohsuga}, title = {Privacy-Preserving Collaborative Data Collection and Analysis With Many Missing Values}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2158--2173}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3174887}, doi = {10.1109/TDSC.2022.3174887}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SeiOOO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YeHMZHFS23, author = {Qingqing Ye and Haibo Hu and Xiaofeng Meng and Huadi Zheng and Kai Huang and Chengfang Fang and Jie Shi}, title = {PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {17--35}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2021.3107512}, doi = {10.1109/TDSC.2021.3107512}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YeHMZHFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Qian00HC023, author = {Qiuyu Qian and Qingqing Ye and Haibo Hu and Kai Huang and Tom Tak{-}Lam Chan and Jin Li}, title = {Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3948--3961}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3289007}, doi = {10.1109/TIFS.2023.3289007}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Qian00HC023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMdis/WongVACQP23, author = {Richmond Y. Wong and Jason Caleb Valdez and Ashten Alexander and Ariel Chiang and Olivia Quesada and James Pierce}, editor = {Daragh Byrne and Nikolas Martelaro and Andy Boucher and David J. Chatting and Sarah Fdili Alaoui and Sarah E. Fox and Iohanna Nicenboim and Cayley MacArthur}, title = {Broadening Privacy and Surveillance: Eliciting Interconnected Values with a Scenarios Workbook on Smart Home Cameras}, booktitle = {Proceedings of the 2023 {ACM} Designing Interactive Systems Conference, {DIS} 2023, Pittsburgh, PA, USA, July 10-14, 2023}, pages = {1093--1113}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3563657.3596012}, doi = {10.1145/3563657.3596012}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMdis/WongVACQP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/HorigomeKY23, author = {Hikaru Horigome and Hiroaki Kikuchi and Chia{-}Mu Yu}, editor = {Leonard Barolli}, title = {Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {654}, pages = {501--512}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28451-9\_44}, doi = {10.1007/978-3-031-28451-9\_44}, timestamp = {Thu, 16 Mar 2023 10:11:29 +0100}, biburl = {https://dblp.org/rec/conf/aina/HorigomeKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/Dhillon23, author = {Simran Dhillon}, editor = {Paul A. Pavlou and Vishal Midha and Animesh Animesh and Traci A. Carte and Alexandre R. Graeml and Alanah Mitchell}, title = {Value-Driven Policy Agenda to Manage Online Privacy of Young Adults}, booktitle = {29th Americas Conference on Information Systems, {AMCIS} 2023, Panama City, Panama, August 10-12, 2023}, publisher = {Association for Information Systems}, year = {2023}, url = {https://aisel.aisnet.org/amcis2023/sig\_sec/sig\_sec/15}, timestamp = {Wed, 19 Jul 2023 08:55:10 +0200}, biburl = {https://dblp.org/rec/conf/amcis/Dhillon23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btw/RohdeFCR23, author = {Florens Rohde and Martin Franke and Victor Christen and Erhard Rahm}, editor = {Birgitta K{\"{o}}nig{-}Ries and Stefanie Scherzinger and Wolfgang Lehner and Gottfried Vossen}, title = {Value-specific Weighting for Record-level Encodings in Privacy-Preserving Record Linkage}, booktitle = {Datenbanksysteme f{\"{u}}r Business, Technologie und Web {(BTW} 2023), 20. Fachtagung des GI-Fachbereichs ,,Datenbanken und Informationssysteme" (DBIS), 06.-10, M{\"{a}}rz 2023, Dresden, Germany, Proceedings}, series = {{LNI}}, volume = {{P-331}}, pages = {439--460}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2023}, url = {https://doi.org/10.18420/BTW2023-21}, doi = {10.18420/BTW2023-21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btw/RohdeFCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MustafaAHHDK23, author = {Maryam Mustafa and Abdul Moeed Asad and Shehrbano Hassan and Urooj Haider and Zainab Durrani and Katharina Krombholz}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {195--209}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623087}, doi = {10.1145/3576915.3623087}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MustafaAHHDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/GohariHT23, author = {Parham Gohari and Matthew T. Hale and Ufuk Topcu}, title = {Privacy-Engineered Value Decomposition Networks for Cooperative Multi-Agent Reinforcement Learning}, booktitle = {62nd {IEEE} Conference on Decision and Control, {CDC} 2023, Singapore, December 13-15, 2023}, pages = {8038--8044}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CDC49753.2023.10384184}, doi = {10.1109/CDC49753.2023.10384184}, timestamp = {Mon, 29 Jan 2024 17:30:32 +0100}, biburl = {https://dblp.org/rec/conf/cdc/GohariHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HasanWSK23, author = {Rakibul Hasan and Rebecca Weil and Rudolf Siegel and Katharina Krombholz}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {A Psychometric Scale to Measure Individuals' Value of Other People's Privacy {(VOPP)}}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {581:1--581:14}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581496}, doi = {10.1145/3544548.3581496}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HasanWSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HothKLB23, author = {Veronica Hoth and Anne Elisabeth Kr{\"{u}}ger and Moritz Langner and Stefan Brandenburg}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters}, title = {Ethical Experience Design for the Value of Privacy based on Psychological Needs}, booktitle = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {537:1--537:4}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544549.3574166}, doi = {10.1145/3544549.3574166}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HothKLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/XueST23, author = {Weihao Xue and Yingpeng Sang and Hui Tian}, editor = {Christine Strauss and Toshiyuki Amagasa and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {{LHKV:} {A} Key-Value Data Collection Mechanism Under Local Differential Privacy}, booktitle = {Database and Expert Systems Applications - 34th International Conference, {DEXA} 2023, Penang, Malaysia, August 28-30, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14146}, pages = {228--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39847-6\_16}, doi = {10.1007/978-3-031-39847-6\_16}, timestamp = {Sat, 30 Sep 2023 09:38:52 +0200}, biburl = {https://dblp.org/rec/conf/dexa/XueST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gerupa/KrugerHB23, author = {Anne Elisabeth Kr{\"{u}}ger and Veronica Hoth and Stefan Brandenburg}, title = {How to Design for Ethical Experiences: Introduction of a Guided Method based on Psychological Needs for the Value of Privacy}, booktitle = {Usability Professionals 2023, Rapperswil, Schweiz, September 3-6, 2023}, pages = {427}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V. und German {UPA} e.V.}, year = {2023}, url = {https://doi.org/10.18420/muc2023-up-427}, doi = {10.18420/MUC2023-UP-427}, timestamp = {Mon, 11 Dec 2023 17:13:58 +0100}, biburl = {https://dblp.org/rec/conf/gerupa/KrugerHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/UkilMJ23, author = {Arijit Ukil and Leandro Mar{\'{\i}}n and Antonio J. Jara}, title = {Priv-Aug-Shap-ECGResNet: Privacy Preserving Shapley-Value Attributed Augmented Resnet for Practical Single-Lead Electrocardiogram Classification}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10096437}, doi = {10.1109/ICASSP49357.2023.10096437}, timestamp = {Sun, 05 Nov 2023 16:51:21 +0100}, biburl = {https://dblp.org/rec/conf/icassp/UkilMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/RahmanP23, author = {Md. Mahmudur Rahman and Sanjay Purushotham}, editor = {Ambuj K. Singh and Yizhou Sun and Leman Akoglu and Dimitrios Gunopulos and Xifeng Yan and Ravi Kumar and Fatma Ozcan and Jieping Ye}, title = {FedPseudo: Privacy-Preserving Pseudo Value-Based Deep Learning Models for Federated Survival Analysis}, booktitle = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023}, pages = {1999--2009}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3580305.3599348}, doi = {10.1145/3580305.3599348}, timestamp = {Mon, 25 Sep 2023 08:29:22 +0200}, biburl = {https://dblp.org/rec/conf/kdd/RahmanP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdai/HorigomeKY23, author = {Hikaru Horigome and Hiroaki Kikuchi and Chia{-}Mu Yu}, editor = {Vicen{\c{c}} Torra and Yasuo Narukawa}, title = {Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks}, booktitle = {Modeling Decisions for Artificial Intelligence - 20th International Conference, {MDAI} 2023, Ume{\aa}, Sweden, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13890}, pages = {241--252}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33498-6\_17}, doi = {10.1007/978-3-031-33498-6\_17}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mdai/HorigomeKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Wang00JM23, author = {Jiachen T. Wang and Yuqing Zhu and Yu{-}Xiang Wang and Ruoxi Jia and Prateek Mittal}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {A Privacy-Friendly Approach to Data Valuation}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/bdd5522a32b3a959a6d81fb6ddc1cb38-Abstract-Conference.html}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Wang00JM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/AstfalkS23, author = {Stefanie Astfalk and Christian H. Schunck}, editor = {Heiko Ro{\ss}nagel and Christian H. Schunck and Jochen G{\"{u}}nther}, title = {Balancing Privacy and Value Creation in the Platform Economy: The Role of Transparency and Intervenability}, booktitle = {Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023}, series = {{LNI}}, volume = {{P-335}}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2023}, url = {https://doi.org/10.18420/OID2023\_12}, doi = {10.18420/OID2023\_12}, timestamp = {Tue, 04 Jul 2023 17:42:03 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/AstfalkS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/LinS23, author = {Tesary Lin and Avner Strulov{-}Shlain}, editor = {Kevin Leyton{-}Brown and Jason D. Hartline and Larry Samuelson}, title = {Choice Architecture, Privacy Valuations, and Selection Bias in Consumer Data}, booktitle = {Proceedings of the 24th {ACM} Conference on Economics and Computation, {EC} 2023, London, United Kingdom, July 9-12, 2023}, pages = {960}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3580507.3597674}, doi = {10.1145/3580507.3597674}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/LinS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchmittLPS023, author = {Vera Schmitt and Zhenni Li and Maija Poikela and Robert P. Spang and Sebastian M{\"{o}}ller}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {19--29}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590180}, doi = {10.1145/3558482.3590180}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchmittLPS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-13336, author = {Justin Singh Kang and Ramtin Pedarsani and Kannan Ramchandran}, title = {The Fair Value of Data Under Heterogeneous Privacy Constraints}, journal = {CoRR}, volume = {abs/2301.13336}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.13336}, doi = {10.48550/ARXIV.2301.13336}, eprinttype = {arXiv}, eprint = {2301.13336}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-13336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09624, author = {Richeng Jin and Zhonggen Su and Caijun Zhong and Zhaoyang Zhang and Tony Q. S. Quek and Huaiyu Dai}, title = {On the f-Differential Privacy Guarantees of Discrete-Valued Mechanisms}, journal = {CoRR}, volume = {abs/2302.09624}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09624}, doi = {10.48550/ARXIV.2302.09624}, eprinttype = {arXiv}, eprint = {2302.09624}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08740, author = {Norbert Tihanyi and Tam{\'{a}}s Bisztray and Bertalan Borsos and Sebastien Raveau}, title = {Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext}, journal = {CoRR}, volume = {abs/2306.08740}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08740}, doi = {10.48550/ARXIV.2306.08740}, eprinttype = {arXiv}, eprint = {2306.08740}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08740.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-05700, author = {Sarah E. Carter and Mathieu d'Aquin and Dayana Spagnuelo and Ilaria Tiddi and Kathryn Cormican and Heike Felzmann}, title = {The Privacy-Value-App Relationship and the Value-Centered Privacy Assistant}, journal = {CoRR}, volume = {abs/2308.05700}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.05700}, doi = {10.48550/ARXIV.2308.05700}, eprinttype = {arXiv}, eprint = {2308.05700}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-05700.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-15709, author = {Jiachen T. Wang and Yuqing Zhu and Yu{-}Xiang Wang and Ruoxi Jia and Prateek Mittal}, title = {Threshold KNN-Shapley: {A} Linear-Time and Privacy-Friendly Approach to Data Valuation}, journal = {CoRR}, volume = {abs/2308.15709}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.15709}, doi = {10.48550/ARXIV.2308.15709}, eprinttype = {arXiv}, eprint = {2308.15709}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-15709.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-06255, author = {Parham Gohari and Matthew T. Hale and Ufuk Topcu}, title = {Privacy-Engineered Value Decomposition Networks for Cooperative Multi-Agent Reinforcement Learning}, journal = {CoRR}, volume = {abs/2311.06255}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.06255}, doi = {10.48550/ARXIV.2311.06255}, eprinttype = {arXiv}, eprint = {2311.06255}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-06255.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/digitalsociety/Carter22, author = {Sarah E. Carter}, title = {A Value-centered Exploration of Data Privacy and Personalized Privacy Assistants}, journal = {Digit. Soc.}, volume = {1}, number = {3}, year = {2022}, url = {https://doi.org/10.1007/s44206-022-00028-w}, doi = {10.1007/S44206-022-00028-W}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/digitalsociety/Carter22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangZWWGTY22, author = {Ning Wang and Wei Zheng and Zhigang Wang and Zhiqiang Wei and Yu Gu and Peng Tang and Ge Yu}, title = {Collecting and analyzing key-value data under shuffled differential privacy}, journal = {Frontiers Comput. Sci.}, volume = {17}, number = {2}, pages = {172606}, year = {2022}, url = {https://doi.org/10.1007/s11704-022-1572-0}, doi = {10.1007/S11704-022-1572-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangZWWGTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/VaiwsriRCS22, author = {Sirintra Vaiwsri and Thilina Ranbaduge and Peter Christen and Rainer Schnell}, title = {Accurate privacy-preserving record linkage for databases with missing values}, journal = {Inf. Syst.}, volume = {106}, pages = {101959}, year = {2022}, url = {https://doi.org/10.1016/j.is.2021.101959}, doi = {10.1016/J.IS.2021.101959}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/is/VaiwsriRCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jche/JonesVBHV22, author = {Kyle M. L. Jones and Amy VanScoy and Kawanna Bright and Alison Harding and Sanika Vedak}, title = {A measurement of faculty views on the meaning and value of student privacy}, journal = {J. Comput. High. Educ.}, volume = {34}, number = {3}, pages = {769--789}, year = {2022}, url = {https://doi.org/10.1007/s12528-022-09320-7}, doi = {10.1007/S12528-022-09320-7}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jche/JonesVBHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mktsci/Lin22, author = {Tesary Lin}, title = {Valuing Intrinsic and Instrumental Preferences for Privacy}, journal = {Mark. Sci.}, volume = {41}, number = {4}, pages = {235--253}, year = {2022}, url = {https://doi.org/10.1287/mksc.2022.1368}, doi = {10.1287/MKSC.2022.1368}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mktsci/Lin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ScottCM22, author = {Mary Scott and Graham Cormode and Carsten Maple}, title = {Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {612--627}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3147643}, doi = {10.1109/TIFS.2022.3147643}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ScottCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangXCLL22, author = {Jungang Yang and Liyao Xiang and Ruidong Chen and Weiting Li and Baochun Li}, title = {Differential Privacy for Tensor-Valued Queries}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {152--164}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2021.3089884}, doi = {10.1109/TIFS.2021.3089884}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangXCLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coopis/HenryHKLGB22, author = {Tiphaine Henry and Julien Hatin and L{\'{e}}o Kazmierczak and Nassim Laga and Walid Gaaloul and Emmanuel Bertin}, editor = {Mohamed Sellami and Paolo Ceravolo and Hajo A. Reijers and Walid Gaaloul and Herv{\'{e}} Panetto}, title = {Random-Value Payment Tokens for On-Chain Privacy-Preserving Payments}, booktitle = {Cooperative Information Systems - 28th International Conference, CoopIS 2022, Bozen-Bolzano, Italy, October 4-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13591}, pages = {223--241}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17834-4\_13}, doi = {10.1007/978-3-031-17834-4\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coopis/HenryHKLGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KurtzVS22, author = {Christian Kurtz and Pascal Vogel and Martin Semmann}, title = {Exploring Archetypes of Value Co-Destructive Privacy Practices}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/79505}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/KurtzVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiuAH22, author = {Jian Liu and Jianqiao An and Yahong Han}, title = {Mining Valuable Source Domain Instances for Privacy-Preserving Domain Adaptive Object Detection}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022, Taipei, Taiwan, July 18-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICME52920.2022.9859911}, doi = {10.1109/ICME52920.2022.9859911}, timestamp = {Wed, 31 Aug 2022 09:04:57 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LiuAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KamatsukaYM22, author = {Akira Kamatsuka and Takahiro Yoshida and Toshiyasu Matsushima}, title = {A Generalization of the Stratonovich's Value of Information and Application to Privacy-Utility Trade-off}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2022, Espoo, Finland, June 26 - July 1, 2022}, pages = {1999--2004}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISIT50566.2022.9834667}, doi = {10.1109/ISIT50566.2022.9834667}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KamatsukaYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/MiaoQWTWWDD22, author = {Ying Miao and Lianyong Qi and Haoyang Wu and Yuxin Tian and Shengqi Wu and Yuqing Wang and Fei Dai and Shaoqi Ding}, editor = {Yuan Xu and Hongyang Yan and Huang Teng and Jun Cai and Jin Li}, title = {Distributed Power Load Missing Value Forecasting with Privacy Protection}, booktitle = {Machine Learning for Cyber Security - 4th International Conference, {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13655}, pages = {521--534}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20096-0\_39}, doi = {10.1007/978-3-031-20096-0\_39}, timestamp = {Mon, 30 Jan 2023 08:02:23 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/MiaoQWTWWDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/DengZTGZL22, author = {Bowen Deng and Lele Zheng and Ze Tong and Jing Gao and Tao Zhang and Qi Li}, title = {{OKV:} Optimized Key-Value Data Collection with Local Differential Privacy}, booktitle = {International Conference on Networking and Network Applications, NaNA 2022, Urumqi, China, December 3-5, 2022}, pages = {421--426}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NaNA56854.2022.00078}, doi = {10.1109/NANA56854.2022.00078}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nana/DengZTGZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/KhavkinT22, author = {Michael Khavkin and Eran Toch}, editor = {Felix Bieker and Joachim Meyer and Sebastian Pape and Ina Schiering and Andreas Weich}, title = {Valuation of Differential Privacy Budget in Data Trade: {A} Conjoint Analysis}, booktitle = {Privacy and Identity Management - 17th {IFIP} {WG} 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {671}, pages = {69--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-31971-6\_7}, doi = {10.1007/978-3-031-31971-6\_7}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/KhavkinT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CampanelliEO22, author = {Matteo Campanelli and Felix Engelmann and Claudio Orlandi}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {761--784}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_33}, doi = {10.1007/978-3-031-14791-3\_33}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/CampanelliEO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuCJG22, author = {Yongji Wu and Xiaoyu Cao and Jinyuan Jia and Neil Zhenqiang Gong}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {519--536}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/wu-yongji}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuCJG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/whiceb/XieX22, author = {Wenfang Xie and Huosong Xia}, title = {How does Privacy Transfer Affect the Value Co-creation Behavior of Gray Privacy Products? -Female Bras as an Example}, booktitle = {The 21st Wuhan International Conference on E-Business, {WHICEB} 2022, Wuhan, China, 27-29 May 2022}, pages = {13}, publisher = {Association for Information Systems}, year = {2022}, url = {https://aisel.aisnet.org/whiceb2022/13}, timestamp = {Thu, 15 Jun 2023 15:22:47 +0200}, biburl = {https://dblp.org/rec/conf/whiceb/XieX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/BonuraCDDMMNNP22, author = {Susanna Bonura and Davide Dalle Carbonare and Roberto D{\'{\i}}az{-}Morales and Marcos Fern{\'{a}}ndez D{\'{\i}}az and Lucrezia Morabito and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Chiara Napione and {\'{A}}ngel Navia{-}V{\'{a}}zquez and Mark Purcell}, editor = {Edward Curry and S{\"{o}}ren Auer and Arne J. Berre and Andreas Metzger and Mar{\'{\i}}a S. P{\'{e}}rez and Sonja Zillner}, title = {Privacy-Preserving Technologies for Trusted Data Spaces}, booktitle = {Technologies and Applications for Big Data Value}, pages = {111--134}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-78307-5\_6}, doi = {10.1007/978-3-030-78307-5\_6}, timestamp = {Tue, 11 Apr 2023 12:52:02 +0200}, biburl = {https://dblp.org/rec/books/sp/22/BonuraCDDMMNNP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11449, author = {Akira Kamatsuka and Takahiro Yoshida and Toshiyasu Matsushima}, title = {A Generalization of the Stratonovich's Value of Information and Application to Privacy-Utility Trade-off}, journal = {CoRR}, volume = {abs/2201.11449}, year = {2022}, url = {https://arxiv.org/abs/2201.11449}, eprinttype = {arXiv}, eprint = {2201.11449}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-13266, author = {Mary Scott and Graham Cormode and Carsten Maple}, title = {Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy}, journal = {CoRR}, volume = {abs/2201.13266}, year = {2022}, url = {https://arxiv.org/abs/2201.13266}, eprinttype = {arXiv}, eprint = {2201.13266}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-13266.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-05085, author = {Gonzalo Munilla Garrido and Kaja Schmidt and Christopher Harth{-}Kitzerow and Johannes Klepsch and Andr{\'{e}} Luckow and Florian Matthes}, title = {Exploring privacy-enhancing technologies in the automotive value chain}, journal = {CoRR}, volume = {abs/2209.05085}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.05085}, doi = {10.48550/ARXIV.2209.05085}, eprinttype = {arXiv}, eprint = {2209.05085}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-05085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-10786, author = {Lulu Pan and Haibin Shao and Yang Lu and Mehran Mesbahi and Dewei Li and Yugeng Xi}, title = {Vector-valued Privacy-Preserving Average Consensus}, journal = {CoRR}, volume = {abs/2209.10786}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.10786}, doi = {10.48550/ARXIV.2209.10786}, eprinttype = {arXiv}, eprint = {2209.10786}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-10786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-00528, author = {Sarah E. Carter}, title = {A Value-Centered Exploration of Data Privacy and Personalized Privacy Assistants}, journal = {CoRR}, volume = {abs/2212.00528}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.00528}, doi = {10.48550/ARXIV.2212.00528}, eprinttype = {arXiv}, eprint = {2212.00528}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-00528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuT22, author = {Bowen Liu and Qiang Tang}, title = {Privacy-preserving Federated Singular Value Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1271}, year = {2022}, url = {https://eprint.iacr.org/2022/1271}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Marsh21, author = {John Marsh}, title = {The Influence of an Individual's Disposition to Value Privacy in a Non-Contrived Study}, school = {Nova Southeastern University, Fort Lauderdale, Florida, {USA}}, year = {2021}, url = {https://nsuworks.nova.edu/gscis\_etd/1137}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Marsh21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aamas/DiJ21, author = {Boya Di and Nicholas R. Jennings}, title = {A contract-based incentive mechanism for distributed meeting scheduling: Can agents who value privacy tell the truth?}, journal = {Auton. Agents Multi Agent Syst.}, volume = {35}, number = {2}, pages = {35}, year = {2021}, url = {https://doi.org/10.1007/s10458-021-09516-8}, doi = {10.1007/S10458-021-09516-8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aamas/DiJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsj/LiLM21, author = {Xiao{-}Bai Li and Xiaoping Liu and Luvai Motiwalla}, title = {Valuing Personal Data with Privacy Consideration}, journal = {Decis. Sci.}, volume = {52}, number = {2}, pages = {393--426}, year = {2021}, url = {https://doi.org/10.1111/deci.12442}, doi = {10.1111/DECI.12442}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsj/LiLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/ZhangZX21, author = {Yueyue Zhang and Cheng Zhang and Yunjie Xu}, title = {Effect of data privacy and security investment on the value of big data firms}, journal = {Decis. Support Syst.}, volume = {146}, pages = {113543}, year = {2021}, url = {https://doi.org/10.1016/j.dss.2021.113543}, doi = {10.1016/J.DSS.2021.113543}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/ZhangZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhangZQ21, author = {Zhishuo Zhang and Wei Zhang and Zhiguang Qin}, title = {A partially hidden policy {CP-ABE} scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {123}, pages = {181--195}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.04.022}, doi = {10.1016/J.FUTURE.2021.04.022}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ZhangZQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/ShahNLBA21, author = {Syed Hamad Hassan Shah and Saleha Noor and Shen Lei and Atif Saleem Butt and Muhammad Ali}, title = {Role of privacy/safety risk and trust on the development of prosumption and value co-creation under the sharing economy: a moderated mediation model}, journal = {Inf. Technol. Dev.}, volume = {27}, number = {4}, pages = {718--735}, year = {2021}, url = {https://doi.org/10.1080/02681102.2021.1877604}, doi = {10.1080/02681102.2021.1877604}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/ShahNLBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/BenamatiOS21, author = {John H. Benamati and Zafer D. Ozdemir and H. Jeff Smith}, title = {Information Privacy, Cultural Values, and Regulatory Preferences}, journal = {J. Glob. Inf. Manag.}, volume = {29}, number = {3}, pages = {131--164}, year = {2021}, url = {https://doi.org/10.4018/jgim.2021050106}, doi = {10.4018/JGIM.2021050106}, timestamp = {Mon, 05 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/BenamatiOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LinCLW21, author = {Wanyu Lin and Helei Cui and Baochun Li and Cong Wang}, title = {Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value Stores}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {32}, number = {5}, pages = {1072--1084}, year = {2021}, url = {https://doi.org/10.1109/TPDS.2020.3042695}, doi = {10.1109/TPDS.2020.3042695}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/LinCLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/HanCM21, author = {Mu Han and Pengzhou Cheng and Shidian Ma}, title = {PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection system based complex-valued neural network}, journal = {Veh. Commun.}, volume = {31}, pages = {100374}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2021.100374}, doi = {10.1016/J.VEHCOM.2021.100374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/HanCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ZhengYDTT21, author = {Xu Zheng and Ke Yan and Jingyuan Duan and Wenyi Tang and Ling Tian}, title = {Histogram Publication over Numerical Values under Local Differential Privacy}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {8886255:1--8886255:11}, year = {2021}, url = {https://doi.org/10.1155/2021/8886255}, doi = {10.1155/2021/8886255}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/ZhengYDTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/KoskelaJPH21, author = {Antti Koskela and Joonas J{\"{a}}lk{\"{o}} and Lukas Prediger and Antti Honkela}, editor = {Arindam Banerjee and Kenji Fukumizu}, title = {Tight Differential Privacy for Discrete-Valued Mechanisms and for the Subsampled Gaussian Mechanism Using {FFT}}, booktitle = {The 24th International Conference on Artificial Intelligence and Statistics, {AISTATS} 2021, April 13-15, 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {130}, pages = {3358--3366}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v130/koskela21a.html}, timestamp = {Wed, 14 Apr 2021 16:51:37 +0200}, biburl = {https://dblp.org/rec/conf/aistats/KoskelaJPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MoscaS21, author = {Francesca Mosca and Jose M. Such}, editor = {Frank Dignum and Alessio Lomuscio and Ulle Endriss and Ann Now{\'{e}}}, title = {{ELVIRA:} An Explainable Agent for Value and Utility-Driven Multiuser Privacy}, booktitle = {{AAMAS} '21: 20th International Conference on Autonomous Agents and Multiagent Systems, Virtual Event, United Kingdom, May 3-7, 2021}, pages = {916--924}, publisher = {{ACM}}, year = {2021}, url = {https://www.ifaamas.org/Proceedings/aamas2021/pdfs/p916.pdf}, doi = {10.5555/3463952.3464061}, timestamp = {Wed, 20 Jul 2022 17:03:47 +0200}, biburl = {https://dblp.org/rec/conf/atal/MoscaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/GarridoSHKLM21, author = {Gonzalo Munilla Garrido and Kaja Schmidt and Christopher Harth{-}Kitzerow and Johannes Klepsch and Andr{\'{e}} Luckow and Florian Matthes}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Exploring privacy-enhancing technologies in the automotive value chain}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {1265--1272}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671528}, doi = {10.1109/BIGDATA52589.2021.9671528}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/GarridoSHKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/case/GiehlHB21, author = {Alexander Giehl and Michael P. Heinl and Maximilian Busch}, title = {Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain}, booktitle = {17th {IEEE} International Conference on Automation Science and Engineering, {CASE} 2021, Lyon, France, August 23-27, 2021}, pages = {2023--2028}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CASE49439.2021.9551656}, doi = {10.1109/CASE49439.2021.9551656}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/case/GiehlHB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/LiuLCGLF21, author = {Tong Liu and Dan Li and Chenhong Cao and Honghao Gao and Chengfan Li and Zhenni Feng}, editor = {Honghao Gao and Xinheng Wang}, title = {Joint Location-Value Privacy Protection for Spatiotemporal Data Collection via Mobile Crowdsensing}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 17th {EAI} International Conference, CollaborateCom 2021, Virtual Event, October 16-18, 2021, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {407}, pages = {87--103}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92638-0\_6}, doi = {10.1007/978-3-030-92638-0\_6}, timestamp = {Wed, 02 Nov 2022 13:39:49 +0100}, biburl = {https://dblp.org/rec/conf/colcom/LiuLCGLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/Tauro21, author = {Carolyn Kavita Tauro}, title = {Values of privacy and trust for monitoring health in injecting drug users}, booktitle = {25th International Enterprise Distributed Object Computing Workshop, {EDOC} Workshop 2021, Gold Coast, Australia, October 25-29, 2021}, pages = {95--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EDOCW52865.2021.00038}, doi = {10.1109/EDOCW52865.2021.00038}, timestamp = {Fri, 03 Dec 2021 09:13:31 +0100}, biburl = {https://dblp.org/rec/conf/edoc/Tauro21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/JonesVBH21, author = {Kyle M. L. Jones and Amy VanScoy and Kawanna Bright and Alison Harding}, title = {Do They Even Care? Measuring Instructor Value of Student Privacy in the Context of Learning Analytics}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--9}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/70797}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/JonesVBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/Carter21, author = {Sarah E. Carter}, editor = {Denis Dennehy and Anastasia Griva and Nancy Pouloudi and Yogesh K. Dwivedi and Ilias O. Pappas and Matti M{\"{a}}ntym{\"{a}}ki}, title = {Is Downloading This App Consistent with My Values? - Conceptualizing a Value-Centered Privacy Assistant}, booktitle = {Responsible {AI} and Analytics for an Ethical and Inclusive Digitized Society - 20th {IFIP} {WG} 6.11 Conference on e-Business, e-Services and e-Society, {I3E} 2021, Galway, Ireland, September 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12896}, pages = {285--291}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85447-8\_25}, doi = {10.1007/978-3-030-85447-8\_25}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/Carter21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/00010L0ZY21, author = {Qingqing Ye and Haibo Hu and Ninghui Li and Xiaofeng Meng and Huadi Zheng and Haotian Yan}, title = {Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting}, booktitle = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOM42981.2021.9488899}, doi = {10.1109/INFOCOM42981.2021.9488899}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/00010L0ZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/MimoM21, author = {Edgard Musafiri Mimo and Troy McDaniel}, title = {3D Privacy Framework: The Citizen Value Driven Privacy Framework}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2021, Manchester, United Kingdom, September 7-10, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISC253183.2021.9562841}, doi = {10.1109/ISC253183.2021.9562841}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/MimoM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/KamatsukaYM21, author = {Akira Kamatsuka and Takahiro Yoshida and Toshiyasu Matsushima}, title = {Privacy-Utility Trade-off with the Stratonovich's Value of Information}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2021, Kanazawa, Japan, October 17-21, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ITW48936.2021.9611484}, doi = {10.1109/ITW48936.2021.9611484}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/KamatsukaYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsdm/BagadMDSGK21, author = {Piyush Bagad and Subrata Mitra and Sunny Dhamnani and Atanu R. Sinha and Raunak Gautam and Haresh Khanna}, editor = {Liane Lewin{-}Eytan and David Carmel and Elad Yom{-}Tov and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Data-Sharing Economy: Value-Addition from Data meets Privacy}, booktitle = {{WSDM} '21, The Fourteenth {ACM} International Conference on Web Search and Data Mining, Virtual Event, Israel, March 8-12, 2021}, pages = {1105--1108}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437963.3441712}, doi = {10.1145/3437963.3441712}, timestamp = {Wed, 07 Apr 2021 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/wsdm/BagadMDSGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-12458, author = {Sarah E. Carter}, title = {Is Downloading this App Consistent with my Values? Conceptualizing a Value-Centered Privacy Assistant}, journal = {CoRR}, volume = {abs/2106.12458}, year = {2021}, url = {https://arxiv.org/abs/2106.12458}, eprinttype = {arXiv}, eprint = {2106.12458}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-12458.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02780, author = {Anish Agarwal and Rahul Singh}, title = {Causal Inference with Corrupted Data: Measurement Error, Missing Values, Discretization, and Differential Privacy}, journal = {CoRR}, volume = {abs/2107.02780}, year = {2021}, url = {https://arxiv.org/abs/2107.02780}, eprinttype = {arXiv}, eprint = {2107.02780}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-03478, author = {Alexander Ziller and Dmitrii Usynin and Moritz Knolle and Kerstin Hammernik and Daniel Rueckert and Georgios Kaissis}, title = {Complex-valued deep learning with differential privacy}, journal = {CoRR}, volume = {abs/2110.03478}, year = {2021}, url = {https://arxiv.org/abs/2110.03478}, eprinttype = {arXiv}, eprint = {2110.03478}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-03478.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11534, author = {Yongji Wu and Xiaoyu Cao and Jinyuan Jia and Neil Zhenqiang Gong}, title = {Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data}, journal = {CoRR}, volume = {abs/2111.11534}, year = {2021}, url = {https://arxiv.org/abs/2111.11534}, eprinttype = {arXiv}, eprint = {2111.11534}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CampanelliEO21, author = {Matteo Campanelli and Felix Engelmann and Claudio Orlandi}, title = {Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1678}, year = {2021}, url = {https://eprint.iacr.org/2021/1678}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CampanelliEO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KousikP21, title = {An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation}, journal = {J. Supercomput.}, volume = {77}, number = {9}, pages = {10003--10011}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s11227-021-03643-5}, doi = {10.1007/S11227-021-03643-5}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/KousikP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Awad20, author = {Nancy Awad}, title = {Publishing set-valued dataset : strengthening the Disassociation approach to improve both privacy preservation and utility. (Publication d'un ensemble de donn{\'{e}}es ensemblistes : renforcer le sch{\'{e}}ma de dissociation pour am{\'{e}}liorer {\`{a}} la fois la protection de la vie priv{\'{e}}e et l'utilit{\'{e}})}, school = {University of Bourgogne-Franche-Comt{\'{e}}, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-03234126}, timestamp = {Mon, 05 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Awad20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OishiSTO20, author = {Keiichiro Oishi and Yuichi Sei and Yasuyuki Tahara and Akihiko Ohsuga}, title = {Semantic diversity: Privacy considering distance between values of sensitive attribute}, journal = {Comput. Secur.}, volume = {94}, pages = {101823}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101823}, doi = {10.1016/J.COSE.2020.101823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OishiSTO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/Rowe20, author = {Frantz Rowe}, title = {Contact tracing apps and values dilemmas: {A} privacy paradox in a neo-liberal world}, journal = {Int. J. Inf. Manag.}, volume = {55}, pages = {102178}, year = {2020}, url = {https://doi.org/10.1016/j.ijinfomgt.2020.102178}, doi = {10.1016/J.IJINFOMGT.2020.102178}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/Rowe20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/OhPLCN20, author = {Hyeontaek Oh and Sangdon Park and Gyu Myoung Lee and Jun Kyun Choi and Sungkee Noh}, title = {Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {3623--3639}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2973662}, doi = {10.1109/JIOT.2020.2973662}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/OhPLCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isem/Bordonaba-Juste20, author = {Victoria Bordonaba{-}Juste and Laura Lucia{-}Palacios and Ra{\'{u}}l P{\'{e}}rez{-}L{\'{o}}pez}, title = {Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services}, journal = {Inf. Syst. {E} Bus. Manag.}, volume = {18}, number = {1}, pages = {35--60}, year = {2020}, url = {https://doi.org/10.1007/s10257-020-00462-8}, doi = {10.1007/S10257-020-00462-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isem/Bordonaba-Juste20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/HuangZC20, author = {Yue Huang and Peng Zeng and Kim{-}Kwang Raymond Choo}, title = {An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in {P2P} Networks}, journal = {J. Circuits Syst. Comput.}, volume = {29}, number = {9}, pages = {2050138:1--2050138:20}, year = {2020}, url = {https://doi.org/10.1142/S0218126620501388}, doi = {10.1142/S0218126620501388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/HuangZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/WangQDYHX20, author = {Shaowei Wang and Yuqiu Qian and Jiachun Du and Wei Yang and Liusheng Huang and Hongli Xu}, title = {Set-valued Data Publication with Local Privacy: Tight Error Bounds and Efficient Mechanisms}, journal = {Proc. {VLDB} Endow.}, volume = {13}, number = {8}, pages = {1234--1247}, year = {2020}, url = {http://www.vldb.org/pvldb/vol13/p1234-wang.pdf}, doi = {10.14778/3389133.3389140}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pvldb/WangQDYHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/RiyanaNR20, author = {Surapon Riyana and Srikul Nanthachumphu and Noppamas Riyana}, title = {Achieving Privacy Preservation Constraints in Missing-Value Datasets}, journal = {{SN} Comput. Sci.}, volume = {1}, number = {4}, pages = {227}, year = {2020}, url = {https://doi.org/10.1007/s42979-020-00241-9}, doi = {10.1007/S42979-020-00241-9}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/RiyanaNR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetci/ChaWTJTY20, author = {Shih{-}Chao Cha and Hao Wang and Zhiyuan Tan and Yuh{-}Jzer Joung and Yen{-}Chung Tseng and Kuo{-}Hui Yeh}, title = {On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining}, journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.}, volume = {4}, number = {5}, pages = {641--652}, year = {2020}, url = {https://doi.org/10.1109/TETCI.2019.2938547}, doi = {10.1109/TETCI.2019.2938547}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetci/ChaWTJTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongLWL20, author = {Haina Song and Tao Luo and Xun Wang and Jianfeng Li}, title = {Multiple Sensitive Values-Oriented Personalized Privacy Preservation Based on Randomized Response}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2209--2224}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2959911}, doi = {10.1109/TIFS.2019.2959911}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SongLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/GoelHDW20, author = {Sanjay Goel and Jingyi Huang and Alan R. Dennis and Kevin J. Williams}, editor = {Bonnie Brinton Anderson and Jason Thatcher and Rayman D. Meservy and Kathy Chudoba and Kelly J. Fadel and Sue Brown}, title = {Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap between Privacy Valuation and Behavior}, booktitle = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual Conference, August 15-17, 2020}, publisher = {Association for Information Systems}, year = {2020}, url = {https://aisel.aisnet.org/amcis2020/info\_security\_privacy/info\_security\_privacy/28}, timestamp = {Mon, 27 Jul 2020 19:06:34 +0200}, biburl = {https://dblp.org/rec/conf/amcis/GoelHDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/Mosca20, author = {Francesca Mosca}, editor = {Amal El Fallah Seghrouchni and Gita Sukthankar and Bo An and Neil Yorke{-}Smith}, title = {Value-Aligned and Explainable Agents for Collective Decision Making: Privacy Application}, booktitle = {Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} '20, Auckland, New Zealand, May 9-13, 2020}, pages = {2199--2200}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems}, year = {2020}, url = {https://dl.acm.org/doi/10.5555/3398761.3399124}, doi = {10.5555/3398761.3399124}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/Mosca20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MoscaSM20, author = {Francesca Mosca and Jose M. Such and Peter McBurney}, editor = {Amal El Fallah Seghrouchni and Gita Sukthankar and Bo An and Neil Yorke{-}Smith}, title = {Towards a Value-driven Explainable Agent for Collective Privacy}, booktitle = {Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} '20, Auckland, New Zealand, May 9-13, 2020}, pages = {1937--1939}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems}, year = {2020}, url = {https://dl.acm.org/doi/10.5555/3398761.3399033}, doi = {10.5555/3398761.3399033}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/MoscaSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/WangMTS20, author = {Lei Wang and Ian R. Manchester and Jochen Trumpf and Guodong Shi}, title = {Initial-Value Privacy of Linear Dynamical Systems}, booktitle = {59th {IEEE} Conference on Decision and Control, {CDC} 2020, Jeju Island, South Korea, December 14-18, 2020}, pages = {3108--3113}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CDC42340.2020.9303900}, doi = {10.1109/CDC42340.2020.9303900}, timestamp = {Fri, 04 Mar 2022 13:31:02 +0100}, biburl = {https://dblp.org/rec/conf/cdc/WangMTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangLBCLL20, author = {Li{-}e Wang and Shan Lin and Yan Bai and Sang{-}Yoon Chang and Xianxian Li and Peng Liu}, title = {A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149167}, doi = {10.1109/ICC40277.2020.9149167}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangLBCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebt/Nabbosa20, author = {Veronica L. Nabbosa}, editor = {Lili Yang}, title = {Me Too: Value Creation by Digitalization and Data Privacy}, booktitle = {{ICEBT} 2020, The 4th International Conference on E-Education, E-Business and E-Technology, Shanghai China, June 5-7, 2020}, pages = {20--24}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3404649.3404650}, doi = {10.1145/3404649.3404650}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icebt/Nabbosa20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/XiangZMZRZ20, author = {Liyao Xiang and Hao Zhang and Haotian Ma and Yifan Zhang and Jie Ren and Quanshi Zhang}, title = {Interpretable Complex-Valued Neural Networks for Privacy Protection}, booktitle = {8th International Conference on Learning Representations, {ICLR} 2020, Addis Ababa, Ethiopia, April 26-30, 2020}, publisher = {OpenReview.net}, year = {2020}, url = {https://openreview.net/forum?id=S1xFl64tDr}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/XiangZMZRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BruschiRPS20, author = {Francesco Bruschi and Vincenzo Rana and Alessio Pagani and Donatella Sciuto}, editor = {Franco Chiaraluce and Leonardo Mostarda}, title = {Acknowledging Value of Personal Information: a Privacy Aware Data Market for Health and Social Research}, booktitle = {Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located with {ITASEC} 2020, Ancona, Italy, February 4, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2580}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2580/DLT\_2020\_paper\_6.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BruschiRPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WuFSK20, author = {Nan Wu and Farhad Farokhi and David B. Smith and Mohamed Ali K{\^{a}}afar}, title = {The Value of Collaboration in Convex Machine Learning with Differential Privacy}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {304--317}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00025}, doi = {10.1109/SP40000.2020.00025}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/WuFSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmbo/SohailKSB20, author = {Syeda Sohail and Johannes Krabbe and Patr{\'{\i}}cio de Alencar Silva and Faiza Allah Bukhsh}, editor = {Ben Roelens and Wim Laurier and Geert Poels and Hans Weigand}, title = {Privacy Value Modeling: {A} Gateway to Ethical Big Data Handling (full paper)}, booktitle = {Proceedings of 14th International Workshop on Value Modelling and Business Ontologies, Brussels, Belgium, January 16-17, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2574}, pages = {5--15}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2574/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:57 +0100}, biburl = {https://dblp.org/rec/conf/vmbo/SohailKSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GefenBTY20, author = {Gilie Gefen and Omer Ben{-}Porat and Moshe Tennenholtz and Elad Yom{-}Tov}, editor = {Amal El Fallah Seghrouchni and Gita Sukthankar and Tie{-}Yan Liu and Maarten van Steen}, title = {Privacy, Altruism, and Experience: Estimating the Perceived Value of Internet Data for Medical Uses}, booktitle = {Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {552--556}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366424.3383414}, doi = {10.1145/3366424.3383414}, timestamp = {Thu, 13 Aug 2020 18:46:26 +0200}, biburl = {https://dblp.org/rec/conf/www/GefenBTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-05892, author = {Geoffrey Goodell}, title = {Privacy by Design in Value-Exchange Systems}, journal = {CoRR}, volume = {abs/2006.05892}, year = {2020}, url = {https://arxiv.org/abs/2006.05892}, eprinttype = {arXiv}, eprint = {2006.05892}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-05892.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07134, author = {Antti Koskela and Joonas J{\"{a}}lk{\"{o}} and Lukas Prediger and Antti Honkela}, title = {Tight Approximate Differential Privacy for Discrete-Valued Mechanisms Using {FFT}}, journal = {CoRR}, volume = {abs/2006.07134}, year = {2020}, url = {https://arxiv.org/abs/2006.07134}, eprinttype = {arXiv}, eprint = {2006.07134}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-10193, author = {Lei Wang and Ian R. Manchester and Jochen Trumpf and Guodong Shi}, title = {Initial-Value Privacy of Linear Dynamical Systems}, journal = {CoRR}, volume = {abs/2008.10193}, year = {2020}, url = {https://arxiv.org/abs/2008.10193}, eprinttype = {arXiv}, eprint = {2008.10193}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-10193.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/BaumannHGL19, author = {Annika Baumann and Johannes Haupt and Fabian Gebert and Stefan Lessmann}, title = {The Price of Privacy - An Evaluation of the Economic Value of Collecting Clickstream Data}, journal = {Bus. Inf. Syst. Eng.}, volume = {61}, number = {4}, pages = {413--431}, year = {2019}, url = {https://doi.org/10.1007/s12599-018-0528-2}, doi = {10.1007/S12599-018-0528-2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/BaumannHGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/PalC19, author = {Ranjan Pal and Jon Crowcroft}, title = {Privacy trading in the surveillance capitalism age \emph{viewpoints on 'privacy-preserving' societal value creation}}, journal = {Comput. Commun. Rev.}, volume = {49}, number = {3}, pages = {26--31}, year = {2019}, url = {https://doi.org/10.1145/3371927.3371931}, doi = {10.1145/3371927.3371931}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/PalC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/Kim19, author = {Sungwook Kim}, title = {A new differential privacy preserving crowdsensing scheme based on the Owen value}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2019}, pages = {159}, year = {2019}, url = {https://doi.org/10.1186/s13638-019-1468-3}, doi = {10.1186/S13638-019-1468-3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/Kim19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/Kim19a, author = {Sungwook Kim}, title = {A new differential privacy preserving crowdsensing scheme based on the Owen value}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2019}, pages = {158}, year = {2019}, url = {https://doi.org/10.1186/s13638-019-1479-0}, doi = {10.1186/S13638-019-1479-0}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/Kim19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssmet/Feltus19, author = {Christophe Feltus}, title = {Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector}, journal = {Int. J. Serv. Sci. Manag. Eng. Technol.}, volume = {10}, number = {4}, pages = {1--25}, year = {2019}, url = {https://doi.org/10.4018/IJSSMET.2019100101}, doi = {10.4018/IJSSMET.2019100101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssmet/Feltus19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CossD19, author = {David Lewis Coss and Gurpreet Dhillon}, title = {Cloud privacy objectives a value based approach}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {189--220}, year = {2019}, url = {https://doi.org/10.1108/ICS-05-2017-0034}, doi = {10.1108/ICS-05-2017-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CossD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/DegelingULHSH19, author = {Martin Degeling and Christine Utz and Christopher Lentzsch and Henry Hosseini and Florian Schaub and Thorsten Holz}, title = {We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's Impact on Web Privacy}, journal = {Inform. Spektrum}, volume = {42}, number = {5}, pages = {345--346}, year = {2019}, url = {https://doi.org/10.1007/s00287-019-01201-1}, doi = {10.1007/S00287-019-01201-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/DegelingULHSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/BuckmanBH19, author = {Joseph R. Buckman and Jesse C. Bockstedt and Matthew J. Hashim}, title = {Relative Privacy Valuations Under Varying Disclosure Characteristics}, journal = {Inf. Syst. Res.}, volume = {30}, number = {2}, pages = {375--388}, year = {2019}, url = {https://doi.org/10.1287/isre.2018.0818}, doi = {10.1287/ISRE.2018.0818}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isr/BuckmanBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mansci/MontesSV19, author = {Rodrigo Montes and Wilfried Sand{-}Zantman and Tommaso M. Valletti}, title = {The Value of Personal Information in Online Markets with Endogenous Privacy}, journal = {Manag. Sci.}, volume = {65}, number = {3}, pages = {1342--1362}, year = {2019}, url = {https://doi.org/10.1287/mnsc.2017.2989}, doi = {10.1287/MNSC.2017.2989}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mansci/MontesSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/EmaOSKOHAKKKI19, author = {Arisa Ema and Hirotaka Osawa and Reina Saijo and Akinori Kubo and Takushi Otani and Hiromitsu Hattori and Naonori Akiya and Nobutsugu Kanzaki and Minao Kukita and Kazunori Komatani and Ryutaro Ichise}, title = {Clarifying Privacy, Property, and Power: Case Study on Value Conflict Between Communities}, journal = {Proc. {IEEE}}, volume = {107}, number = {3}, pages = {575--581}, year = {2019}, url = {https://doi.org/10.1109/JPROC.2018.2837045}, doi = {10.1109/JPROC.2018.2837045}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/EmaOSKOHAKKKI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GaoZ19, author = {Yunpeng Gao and Nan Zhang}, title = {Social Security and Privacy for Social IoT Polymorphic Value Set: {A} Solution to Inference Attacks on Social Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5498375:1--5498375:16}, year = {2019}, url = {https://doi.org/10.1155/2019/5498375}, doi = {10.1155/2019/5498375}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GaoZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuT19, author = {Bowen Liu and Qiang Tang}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Privacy-Preserving Decentralised Singular Value Decomposition}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {703--721}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_41}, doi = {10.1007/978-3-030-41579-2\_41}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiuT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DegelingULHSH19, author = {Martin Degeling and Christine Utz and Christopher Lentzsch and Henry Hosseini and Florian Schaub and Thorsten Holz}, title = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/we-value-your-privacy-now-take-some-cookies-measuring-the-gdprs-impact-on-web-privacy/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DegelingULHSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YeHMZ19, author = {Qingqing Ye and Haibo Hu and Xiaofeng Meng and Huadi Zheng}, title = {PrivKV: Key-Value Data Collection with Local Differential Privacy}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {317--331}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00018}, doi = {10.1109/SP.2019.00018}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YeHMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-09546, author = {Liyao Xiang and Haotian Ma and Hao Zhang and Yifan Zhang and Quanshi Zhang}, title = {Complex-Valued Neural Networks for Privacy Protection}, journal = {CoRR}, volume = {abs/1901.09546}, year = {2019}, url = {http://arxiv.org/abs/1901.09546}, eprinttype = {arXiv}, eprint = {1901.09546}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-09546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-08562, author = {Gilie Gefen and Omer Ben{-}Porat and Moshe Tennenholtz and Elad Yom{-}Tov}, title = {Privacy, altruism, and experience: Estimating the perceived value of Internet data for medical uses}, journal = {CoRR}, volume = {abs/1906.08562}, year = {2019}, url = {http://arxiv.org/abs/1906.08562}, eprinttype = {arXiv}, eprint = {1906.08562}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-08562.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09679, author = {Nan Wu and Farhad Farokhi and David B. Smith and Mohamed Ali K{\^{a}}afar}, title = {The Value of Collaboration in Convex Machine Learning with Differential Privacy}, journal = {CoRR}, volume = {abs/1906.09679}, year = {2019}, url = {http://arxiv.org/abs/1906.09679}, eprinttype = {arXiv}, eprint = {1906.09679}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-05014, author = {Lin Sun and Jun Zhao and Xiaojun Ye and Shuo Feng and Teng Wang and Tao Bai}, title = {Conditional Analysis for Key-Value Data with Local Differential Privacy}, journal = {CoRR}, volume = {abs/1907.05014}, year = {2019}, url = {http://arxiv.org/abs/1907.05014}, eprinttype = {arXiv}, eprint = {1907.05014}, timestamp = {Mon, 05 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-05014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10331, author = {Michalis Pachilakis and Panagiotis Papadopoulos and Nikolaos Laoutaris and Evangelos P. Markatos and Nicolas Kourtellis}, title = {Measuring ad value without bankrupting user privacy}, journal = {CoRR}, volume = {abs/1907.10331}, year = {2019}, url = {http://arxiv.org/abs/1907.10331}, eprinttype = {arXiv}, eprint = {1907.10331}, timestamp = {Thu, 01 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuT19, author = {Bowen Liu and Qiang Tang}, title = {Privacy-Preserving Decentralised Singular Value Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1346}, year = {2019}, url = {https://eprint.iacr.org/2019/1346}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XingMGC18, author = {Ling Xing and Qiang Ma and Jianping Gao and Song Chen}, title = {An Optimized Algorithm for Protecting Privacy Based on Coordinates Mean Value for Cognitive Radio Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {21971--21979}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2822839}, doi = {10.1109/ACCESS.2018.2822839}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XingMGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YucelB18, author = {Fatih Yucel and Eyuphan Bulut}, title = {Clustered Crowd {GPS} for Privacy Valuing Active Localization}, journal = {{IEEE} Access}, volume = {6}, pages = {23213--23221}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2830300}, doi = {10.1109/ACCESS.2018.2830300}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YucelB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/DhillonOS18, author = {Gurpreet Dhillon and Tiago Oliveira and Romilla Syed}, title = {Value-based information privacy objectives for Internet Commerce}, journal = {Comput. Hum. Behav.}, volume = {87}, pages = {292--307}, year = {2018}, url = {https://doi.org/10.1016/j.chb.2018.05.043}, doi = {10.1016/J.CHB.2018.05.043}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/DhillonOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MalgieriC18, author = {Gianclaudio Malgieri and Bart Custers}, title = {Pricing privacy - the right to know the value of your personal data}, journal = {Comput. Law Secur. Rev.}, volume = {34}, number = {2}, pages = {289--303}, year = {2018}, url = {https://doi.org/10.1016/j.clsr.2017.08.006}, doi = {10.1016/J.CLSR.2017.08.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MalgieriC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/WottrichRS18, author = {Verena M. Wottrich and Eva A. van Reijmersdal and Edith G. Smit}, title = {The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns}, journal = {Decis. Support Syst.}, volume = {106}, pages = {44--52}, year = {2018}, url = {https://doi.org/10.1016/j.dss.2017.12.003}, doi = {10.1016/J.DSS.2017.12.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/WottrichRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuLD18, author = {Mengjun Liu and Shubo Liu and Yonggang Ding}, title = {{\unicode{22522}}{\unicode{20110}}0-1{\unicode{32534}}{\unicode{30721}}{\unicode{30340}}{\unicode{21442}}{\unicode{19982}}{\unicode{24335}}{\unicode{24863}}{\unicode{30693}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}}{\unicode{30340}}{\unicode{25968}}{\unicode{25454}}{\unicode{20215}}{\unicode{20540}}{\unicode{21305}}{\unicode{37197}}{\unicode{26041}}{\unicode{26696}} {(0-1} Code Based Privacy-preserving Data Value Matching in Participatory Sensing)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {3}, pages = {131--137}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.03.021}, doi = {10.11896/J.ISSN.1002-137X.2018.03.021}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/midm/MeinertABKWP18, author = {Edward Meinert and Abrar Alturkistani and David Brindley and Peter Knight and Glenn Wells and Nick de Pennington}, title = {Weighing benefits and risks in aspects of security, privacy and adoption of technology in a value-based healthcare system}, journal = {{BMC} Medical Informatics Decis. Mak.}, volume = {18}, number = {1}, pages = {100:1--100:4}, year = {2018}, url = {https://doi.org/10.1186/s12911-018-0700-0}, doi = {10.1186/S12911-018-0700-0}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/midm/MeinertABKWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/Ashouri-Talouki18, author = {Maede Ashouri{-}Talouki}, title = {An efficient privacy-preserving {P2P} protocol for computing maximum value in the presence of active adversaries}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {1}, pages = {34--43}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0490-z}, doi = {10.1007/S12083-016-0490-Z}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/Ashouri-Talouki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhangZYD18, author = {Hongli Zhang and Zhigang Zhou and Lin Ye and Xiaojiang Du}, title = {Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {2}, pages = {316--329}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2430316}, doi = {10.1109/TCC.2015.2430316}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhangZYD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/teco/WangYZ18, author = {Weina Wang and Lei Ying and Junshan Zhang}, title = {The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms, and Fundamental Limits}, journal = {{ACM} Trans. Economics and Comput.}, volume = {6}, number = {2}, pages = {8:1--8:26}, year = {2018}, url = {https://doi.org/10.1145/3232863}, doi = {10.1145/3232863}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/teco/WangYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiX18, author = {Guang Li and Rui Xue}, title = {A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition}, journal = {Wirel. Pers. Commun.}, volume = {102}, number = {2}, pages = {1799--1808}, year = {2018}, url = {https://doi.org/10.1007/s11277-017-5237-5}, doi = {10.1007/S11277-017-5237-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausdm/VaiwsriRC18, author = {Sirintra Vaiwsri and Thilina Ranbaduge and Peter Christen}, editor = {Md. Rafiqul Islam and Yun Sing Koh and Yanchang Zhao and Warwick Graco and David Stirling and Chang{-}Tsun Li and Md Zahidul Islam}, title = {Reference Values Based Hardening for Bloom Filters Based Privacy-Preserving Record Linkage}, booktitle = {Data Mining - 16th Australasian Conference, AusDM 2018, Bahrurst, NSW, Australia, November 28-30, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {996}, pages = {189--202}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-6661-1\_15}, doi = {10.1007/978-981-13-6661-1\_15}, timestamp = {Thu, 23 Jun 2022 19:58:25 +0200}, biburl = {https://dblp.org/rec/conf/ausdm/VaiwsriRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChanyaswadDPM18, author = {Thee Chanyaswad and Alex Dytso and H. Vincent Poor and Prateek Mittal}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{MVG} Mechanism: Differential Privacy under Matrix-Valued Query}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {230--246}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243750}, doi = {10.1145/3243734.3243750}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChanyaswadDPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BouraCGJPP18, author = {Christina Boura and Ilaria Chillotti and Nicolas Gama and Dimitar Jetchev and Stanislav Peceny and Alexander Petric}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {High-Precision Privacy-Preserving Real-Valued Function Evaluation}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {183--202}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_10}, doi = {10.1007/978-3-662-58387-6\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BouraCGJPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconference/VitakLKZK18, author = {Jessica Vitak and Yuting Liao and Priya Kumar and Michael T. Zimmer and Katherine Kritikos}, editor = {Gobinda Chowdhury and Julie McLeod and Valerie J. Gillet and Peter Willett}, title = {Privacy Attitudes and Data Valuation Among Fitness Tracker Users}, booktitle = {Transforming Digital Worlds - 13th International Conference, iConference 2018, Sheffield, UK, March 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10766}, pages = {229--239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78105-1\_27}, doi = {10.1007/978-3-319-78105-1\_27}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconference/VitakLKZK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0003HNWXY18, author = {Shaowei Wang and Liusheng Huang and Yiwen Nie and Pengzhan Wang and Hongli Xu and Wei Yang}, title = {PrivSet: Set-Valued Data Analyses with Locale Differential Privacy}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {1088--1096}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486234}, doi = {10.1109/INFOCOM.2018.8486234}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/0003HNWXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/NiuZWTGC18, author = {Chaoyue Niu and Zhenzhe Zheng and Fan Wu and Shaojie Tang and Xiaofeng Gao and Guihai Chen}, editor = {Yike Guo and Faisal Farooq}, title = {Unlocking the Value of Privacy: Trading Aggregate Statistics over Private Correlated Data}, booktitle = {Proceedings of the 24th {ACM} {SIGKDD} International Conference on Knowledge Discovery {\&} Data Mining, {KDD} 2018, London, UK, August 19-23, 2018}, pages = {2031--2040}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3219819.3220013}, doi = {10.1145/3219819.3220013}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/NiuZWTGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/taai/LinHS18, author = {Wen{-}Yang Lin and Kuang{-}Yung Hsu and Zih{-}Xun Shen}, title = {Privacy-Preserving {SRS} Data Anonymization by Incorporating Missing Values}, booktitle = {Conference on Technologies and Applications of Artificial Intelligence, {TAAI} 2018, Taichung, Taiwan, November 30 - December 2, 2018}, pages = {106--109}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/TAAI.2018.00032}, doi = {10.1109/TAAI.2018.00032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/taai/LinHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/Askinadze018, author = {Alexander Askinadze and Stefan Conrad}, editor = {Layth Sliman and Ismael Bouassida Rodriguez and Kaori Yoshida}, title = {Respecting Data Privacy in Educational Data Mining: An Approach to the Transparent Handling of Student Data and Dealing with the Resulting Missing Value Problem}, booktitle = {27th {IEEE} International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, {WETICE} 2018, Paris, France, June 27-29, 2018}, pages = {160--164}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/WETICE.2018.00037}, doi = {10.1109/WETICE.2018.00037}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/Askinadze018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/TanSBBMB18, author = {Joshua Tan and Mahmood Sharif and Sruti Bhagavatula and Matthias Beckerle and Michelle L. Mazurek and Lujo Bauer}, editor = {David Lie and Mohammad Mannan and Aaron Johnson}, title = {Comparing Hypothetical and Realistic Privacy Valuations}, booktitle = {Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {168--182}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267323.3268961}, doi = {10.1145/3267323.3268961}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/TanSBBMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-00823, author = {Thee Chanyaswad and Alex Dytso and H. Vincent Poor and Prateek Mittal}, title = {{MVG} Mechanism: Differential Privacy under Matrix-Valued Query}, journal = {CoRR}, volume = {abs/1801.00823}, year = {2018}, url = {http://arxiv.org/abs/1801.00823}, eprinttype = {arXiv}, eprint = {1801.00823}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-00823.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-10077, author = {Thee Chanyaswad and Alex Dytso and H. Vincent Poor and Prateek Mittal}, title = {A Differential Privacy Mechanism Design Under Matrix-Valued Query}, journal = {CoRR}, volume = {abs/1802.10077}, year = {2018}, url = {http://arxiv.org/abs/1802.10077}, eprinttype = {arXiv}, eprint = {1802.10077}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-10077.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-05096, author = {Martin Degeling and Christine Utz and Christopher Lentzsch and Henry Hosseini and Florian Schaub and Thorsten Holz}, title = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy}, journal = {CoRR}, volume = {abs/1808.05096}, year = {2018}, url = {http://arxiv.org/abs/1808.05096}, eprinttype = {arXiv}, eprint = {1808.05096}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-05096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/DogruelJV17, author = {Leyla Dogruel and Sven J{\"{o}}ckel and Jessica Vitak}, title = {The valuation of privacy premium features for smartphone apps: The influence of defaults and expert recommendations}, journal = {Comput. Hum. Behav.}, volume = {77}, pages = {230--239}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2017.08.035}, doi = {10.1016/J.CHB.2017.08.035}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/DogruelJV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/TurgutB17, author = {Damla Turgut and Ladislau B{\"{o}}l{\"{o}}ni}, title = {Value of Information and Cost of Privacy in the Internet of Things}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {9}, pages = {62--66}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600625}, doi = {10.1109/MCOM.2017.1600625}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/TurgutB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/ChiHJLO17, author = {Yuan Chi and Jun Hong and Anna Jurek and Weiru Liu and Dermot O'Reilly}, title = {Privacy preserving record linkage in the presence of missing values}, journal = {Inf. Syst.}, volume = {71}, pages = {199--210}, year = {2017}, url = {https://doi.org/10.1016/j.is.2017.07.001}, doi = {10.1016/J.IS.2017.07.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/ChiHJLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/KarwatzkiDTV17, author = {Sabrina Karwatzki and Olga Dytynko and Manuel Trenz and Daniel Veit}, title = {Beyond the Personalization-Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization}, journal = {J. Manag. Inf. Syst.}, volume = {34}, number = {2}, pages = {369--400}, year = {2017}, url = {https://doi.org/10.1080/07421222.2017.1334467}, doi = {10.1080/07421222.2017.1334467}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/KarwatzkiDTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ShiH18, author = {Xiujin Shi and Yanling Hu}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{20998}}{\unicode{31867}}{\unicode{26641}}{\unicode{30340}}{\unicode{21160}}{\unicode{24577}}{\unicode{38598}}{\unicode{20540}}{\unicode{22411}}{\unicode{25968}}{\unicode{25454}}{\unicode{21457}}{\unicode{24067}}{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}} (Privacy Preserving Based on Taxonomy Tree for Dynamic Set-valued Data Publishing)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {5}, pages = {120--124}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.05.022}, doi = {10.11896/J.ISSN.1002-137X.2017.05.022}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ShiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/YangWX18, author = {Yueping Yang and Jian Wang and Mingfu Xue}, title = {{\unicode{38754}}{\unicode{21521}}{\unicode{25935}}{\unicode{24863}}{\unicode{20540}}{\unicode{30340}}{\unicode{23618}}{\unicode{27425}}{\unicode{21270}}{\unicode{22810}}{\unicode{28304}}{\unicode{25968}}{\unicode{25454}}{\unicode{34701}}{\unicode{21512}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}} (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {9}, pages = {156--161}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.09.030}, doi = {10.11896/J.ISSN.1002-137X.2017.09.030}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/YangWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/YinXS17, author = {Chunyong Yin and Jinwen Xi and Ruxia Sun}, title = {Location Privacy Protection Based on Improved K-Value Method in Augmented Reality on Mobile Devices}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {7251395:1--7251395:7}, year = {2017}, url = {https://doi.org/10.1155/2017/7251395}, doi = {10.1155/2017/7251395}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/YinXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/WongMWPC17, author = {Richmond Y. Wong and Deirdre K. Mulligan and Ellen Van Wyk and James Pierce and John Chuang}, title = {Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {1}, number = {{CSCW}}, pages = {111:1--111:26}, year = {2017}, url = {https://doi.org/10.1145/3134746}, doi = {10.1145/3134746}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/WongMWPC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/Syed17, author = {Romilla Syed}, title = {Modeling Values of Internet of Things (IoT) Consumers' for Privacy Decision-Making}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/AdvancesIS/Presentations/3}, timestamp = {Tue, 23 May 2017 14:16:12 +0200}, biburl = {https://dblp.org/rec/conf/amcis/Syed17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecsa/HalunenK17, author = {Kimmo Halunen and Anni Karinsalo}, editor = {Rog{\'{e}}rio de Lemos}, title = {Measuring the value of privacy and the efficacy of PETs}, booktitle = {11th European Conference on Software Architecture, {ECSA} 2017, Companion Proceedings, Canterbury, United Kingdom, September 11-15, 2017}, pages = {132--135}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3129790.3129806}, doi = {10.1145/3129790.3129806}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecsa/HalunenK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RuffingM17, author = {Tim Ruffing and Pedro Moreno{-}Sanchez}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {133--154}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_8}, doi = {10.1007/978-3-319-70278-0\_8}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/RuffingM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MayleBMBT17, author = {Alex Mayle and Neda Hajiakhoond Bidoki and Sina Masnadi and Ladislau B{\"{o}}l{\"{o}}ni and Damla Turgut}, title = {Investigating the Value of Privacy within the Internet of Things}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8253958}, doi = {10.1109/GLOCOM.2017.8253958}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/MayleBMBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PoikelaT17, author = {Maija Poikela and Eran Toch}, editor = {Tung Bui}, title = {Understanding the Valuation of Location Privacy: a Crowdsourcing-Based Approach}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41395}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/PoikelaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/KarapiperisGV17, author = {Dimitrios Karapiperis and Aris Gkoulalas{-}Divanis and Vassilios S. Verykios}, title = {Distance-Aware Encoding of Numerical Values for Privacy-Preserving Record Linkage}, booktitle = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017, San Diego, CA, USA, April 19-22, 2017}, pages = {135--138}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDE.2017.58}, doi = {10.1109/ICDE.2017.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/KarapiperisGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/BrowneOH17, author = {Oliver Browne and Philip O'Reilly and Mark Hutchinson}, editor = {Yong Jin Kim and Ritu Agarwal and Jae Kyu Lee}, title = {Ephemeral Returns: Social Network Valuations and Perceived Privacy}, booktitle = {Proceedings of the International Conference on Information Systems - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul, South Korea, December 10-13, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/icis2017/Economics/Presentations/10}, timestamp = {Sun, 28 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/BrowneOH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/ChenLZ17, author = {Shuo Chen and Rongxing Lu and Jie Zhang}, editor = {Jan{-}Philipp Stegh{\"{o}}fer and Babak Esfandiari}, title = {A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment}, booktitle = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {505}, pages = {21--37}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59171-1\_3}, doi = {10.1007/978-3-319-59171-1\_3}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/ChenLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/VervierZLZ17, author = {Luisa Vervier and Eva{-}Maria Zeissig and Chantal Lidynia and Martina Ziefle}, editor = {Muthu Ramachandran and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Verena Kantere and Gary B. Wills and Robert John Walters and Victor Chang}, title = {Perceptions of Digital Footprints and the Value of Privacy}, booktitle = {Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017}, pages = {80--91}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006301000800091}, doi = {10.5220/0006301000800091}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/VervierZLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/JungK17, author = {Woojin Jung and Hee{-}Woong Kim}, editor = {Rose Alinda Alias and Pan Shan Ling and Shamshul Bahri and Patrick Finnegan and Choon Ling Sia}, title = {Estimating the Monetary Value of Information Privacy in the Context of {SNS}}, booktitle = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017, Langkawi, Malaysia, July 16-20, 2017}, pages = {146}, year = {2017}, url = {http://aisel.aisnet.org/pacis2017/146}, timestamp = {Fri, 15 Sep 2017 09:22:54 +0200}, biburl = {https://dblp.org/rec/conf/pacis/JungK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/PuG17, author = {Yu Pu and Jens Grossklags}, title = {Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {339--355}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/pu}, timestamp = {Wed, 19 Jul 2017 17:13:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/PuG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/Chatzikokolakis17, author = {Konstantinos Chatzikokolakis and Serge Haddad and Ali Kassem and Catuscia Palamidessi}, editor = {Andrea Marin and Benny Van Houdt and Giuliano Casale and Dorina C. Petriu and Sabina Rossi}, title = {Trading Optimality for Performance in Location Privacy}, booktitle = {Proceedings of the 11th {EAI} International Conference on Performance Evaluation Methodologies and Tools, {VALUETOOLS} 2017, Venice, Italy, December 05-07, 2017}, pages = {221--222}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3150928.3150962}, doi = {10.1145/3150928.3150962}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/valuetools/Chatzikokolakis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/KalwarGKRA17, author = {Safia Kalwar and Eugenio Gianniti and Joas Yannick Kinouani and Youssef Ridene and Danilo Ardagna}, editor = {Simonetta Balsamo and Andrea Marin and Enrico Vicario}, title = {Performance Degradation and Cost Impact Evaluation of Privacy Preserving Mechanisms in Big Data Systems}, booktitle = {New Frontiers in Quantitative Methods in Informatics - 7th Workshop, InfQ 2017, Venice, Italy, December 4, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {825}, pages = {82--96}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-91632-3\_7}, doi = {10.1007/978-3-319-91632-3\_7}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/valuetools/KalwarGKRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenLZ17a, author = {Shuo Chen and Rongxing Lu and Jie Zhang}, title = {A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment}, journal = {CoRR}, volume = {abs/1703.06659}, year = {2017}, url = {http://arxiv.org/abs/1703.06659}, eprinttype = {arXiv}, eprint = {1703.06659}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ChenLZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04767, author = {Miltiades E. Anagnostou and Maria A. Lambrou}, title = {A review of approaches to the value of privacy}, journal = {CoRR}, volume = {abs/1709.04767}, year = {2017}, url = {http://arxiv.org/abs/1709.04767}, eprinttype = {arXiv}, eprint = {1709.04767}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCGJPP17, author = {Christina Boura and Ilaria Chillotti and Nicolas Gama and Dimitar Jetchev and Stanislav Peceny and Alexander Petric}, title = {High-Precision Privacy-Preserving Real-Valued Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1234}, year = {2017}, url = {http://eprint.iacr.org/2017/1234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCGJPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/HirschprungTBM16, author = {Ron S. Hirschprung and Eran Toch and Frank John Bolton and Oded Maimon}, title = {A methodology for estimating the value of privacy in information disclosure systems}, journal = {Comput. Hum. Behav.}, volume = {61}, pages = {443--453}, year = {2016}, url = {https://doi.org/10.1016/j.chb.2016.03.033}, doi = {10.1016/J.CHB.2016.03.033}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/HirschprungTBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/NguyenRJ16, author = {Kenneth D. Nguyen and Heather Rosoff and Richard S. John}, title = {The effects of attacker identity and individual user characteristics on the value of information privacy}, journal = {Comput. Hum. Behav.}, volume = {55}, pages = {372--383}, year = {2016}, url = {https://doi.org/10.1016/j.chb.2015.09.031}, doi = {10.1016/J.CHB.2015.09.031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/NguyenRJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Moore16, author = {Adam D. Moore}, title = {Privacy, speech, and values: what we have no business knowing}, journal = {Ethics Inf. Technol.}, volume = {18}, number = {1}, pages = {41--49}, year = {2016}, url = {https://doi.org/10.1007/s10676-016-9397-x}, doi = {10.1007/S10676-016-9397-X}, timestamp = {Thu, 14 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Moore16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhangJZW16, author = {Wujun Zhang and Shunrong Jiang and Xiaoyan Zhu and Yumin Wang}, title = {Cooperative downloading with privacy preservation and access control for value-added services in VANETs}, journal = {Int. J. Grid Util. Comput.}, volume = {7}, number = {1}, pages = {50--60}, year = {2016}, url = {https://doi.org/10.1504/IJGUC.2016.073778}, doi = {10.1504/IJGUC.2016.073778}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijguc/ZhangJZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/MaitlandBO16, author = {Nadine Barrett Maitland and Corlane Barclay and Kweku{-}Muata Osei{-}Bryson}, title = {Security in Social Networking Services: {A} Value-Focused Thinking Exploration in Understanding Users' Privacy and Security Concerns}, journal = {Inf. Technol. Dev.}, volume = {22}, number = {3}, pages = {464--486}, year = {2016}, url = {https://doi.org/10.1080/02681102.2016.1173002}, doi = {10.1080/02681102.2016.1173002}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/MaitlandBO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SidgmanC16, author = {Juergen Sidgman and Malcolm Crompton}, title = {Valuing Personal Data to Foster Privacy: {A} Thought Experiment and Opportunities for Research}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {169--181}, year = {2016}, url = {https://doi.org/10.2308/isys-51429}, doi = {10.2308/ISYS-51429}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SidgmanC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/libt/CampbellC16, author = {D. Grant Campbell and Scott R. Cowan}, title = {The Paradox of Privacy: Revisiting a Core Library Value in an Age of Big Data and Linked Data}, journal = {Libr. Trends}, volume = {64}, number = {3}, pages = {492--511}, year = {2016}, url = {https://doi.org/10.1353/lib.2016.0006}, doi = {10.1353/LIB.2016.0006}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/libt/CampbellC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/PuG16, author = {Yu Pu and Jens Grossklags}, title = {Towards a Model on the Factors Influencing Social App Users' Valuation of Interdependent Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {2}, pages = {61--81}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0005}, doi = {10.1515/POPETS-2016-0005}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/PuG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HasanJLLC16, author = {A. S. M. Touhidul Hasan and Qingshan Jiang and Jun Luo and Chengming Li and Lifei Chen}, title = {An effective value swapping method for privacy preserving data publishing}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3219--3228}, year = {2016}, url = {https://doi.org/10.1002/sec.1527}, doi = {10.1002/SEC.1527}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HasanJLLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/teco/ChenCKMV16, author = {Yiling Chen and Stephen Chong and Ian A. Kash and Tal Moran and Salil P. Vadhan}, title = {Truthful Mechanisms for Agents That Value Privacy}, journal = {{ACM} Trans. Economics and Comput.}, volume = {4}, number = {3}, pages = {13:1--13:30}, year = {2016}, url = {https://doi.org/10.1145/2892555}, doi = {10.1145/2892555}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/teco/ChenCKMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QinYYKXR16, author = {Zhan Qin and Yin Yang and Ting Yu and Issa Khalil and Xiaokui Xiao and Kui Ren}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {192--203}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978409}, doi = {10.1145/2976749.2978409}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/QinYYKXR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhangYGZ16, author = {Mengyuan Zhang and Lei Yang and Xiaowen Gong and Junshan Zhang}, title = {Privacy-Preserving Crowdsensing: Privacy Valuation, Network Effect, and Profit Maximization}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7842170}, doi = {10.1109/GLOCOM.2016.7842170}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhangYGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KatellMS16, author = {Michael A. Katell and Sonali R. Mishra and Ligaya Scaff}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {A Fair Exchange: Exploring How Online Privacy is Valued}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {1881--1890}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.239}, doi = {10.1109/HICSS.2016.239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/KatellMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarakatBNG16, author = {Sara Barakat and Bechara al Bouna and Mohamed Nassar and Christophe Guyeux}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {318--326}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969403180326}, doi = {10.5220/0005969403180326}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BarakatBNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/WangYZ16, author = {Weina Wang and Lei Ying and Junshan Zhang}, editor = {Sara Alouf and Alain Jean{-}Marie and Nidhi Hegde and Alexandre Prouti{\`{e}}re}, title = {The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits}, booktitle = {Proceedings of the 2016 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Science, Antibes Juan-Les-Pins, France, June 14-18, 2016}, pages = {249--260}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2896377.2901461}, doi = {10.1145/2896377.2901461}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmetrics/WangYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/AbokhodairAVM16, author = {Norah Abokhodair and Sofiane Abbar and Sarah Vieweg and Yelena Mejova}, editor = {Wolfgang Nejdl and Wendy Hall and Paolo Parigi and Steffen Staab}, title = {Privacy and twitter in qatar: traditional values in the digital world}, booktitle = {Proceedings of the 8th {ACM} Conference on Web Science, WebSci 2016, Hannover, Germany, May 22-25, 2016}, pages = {66--77}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2908131.2908146}, doi = {10.1145/2908131.2908146}, timestamp = {Sat, 09 Apr 2022 12:47:40 +0200}, biburl = {https://dblp.org/rec/conf/websci/AbokhodairAVM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbokhodairAVM16, author = {Norah Abokhodair and Sofiane Abbar and Sarah Vieweg and Yelena Mejova}, title = {Privacy and Twitter in Qatar: Traditional Values in the Digital World}, journal = {CoRR}, volume = {abs/1605.01741}, year = {2016}, url = {http://arxiv.org/abs/1605.01741}, eprinttype = {arXiv}, eprint = {1605.01741}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbokhodairAVM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BarakatBNG16, author = {Sara Barakat and Bechara al Bouna and Mohamed Nassar and Christophe Guyeux}, title = {On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets}, journal = {CoRR}, volume = {abs/1611.08417}, year = {2016}, url = {http://arxiv.org/abs/1611.08417}, eprinttype = {arXiv}, eprint = {1611.08417}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BarakatBNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangYZ16, author = {Weina Wang and Lei Ying and Junshan Zhang}, title = {The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits}, journal = {CoRR}, volume = {abs/1603.06870}, year = {2016}, url = {http://arxiv.org/abs/1603.06870}, eprinttype = {arXiv}, eprint = {1603.06870}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WangYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuangLHY15, author = {Xuezhen Huang and Jiqiang Liu and Zhen Han and Jun Yang}, title = {Privacy beyond sensitive values}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {7}, pages = {1--15}, year = {2015}, url = {https://doi.org/10.1007/s11432-014-5232-3}, doi = {10.1007/S11432-014-5232-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HuangLHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/0009WQDL15, author = {Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo{-}Ferrer and Bao Liu}, title = {Practical secure and privacy-preserving scheme for value-added applications in VANETs}, journal = {Comput. Commun.}, volume = {71}, pages = {50--60}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.08.005}, doi = {10.1016/J.COMCOM.2015.08.005}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/0009WQDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Preibusch15, author = {S{\"{o}}ren Preibusch}, title = {The Value of Web Search Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {5}, pages = {24--32}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.109}, doi = {10.1109/MSP.2015.109}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Preibusch15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jits/AntoniouP15, author = {Constantinos Antoniou and Amalia Polydoropoulou}, title = {The Value of Privacy: Evidence From the Use of Mobile Devices for Traveler Information Systems}, journal = {J. Intell. Transp. Syst.}, volume = {19}, number = {2}, pages = {167--180}, year = {2015}, url = {https://doi.org/10.1080/15472450.2014.936284}, doi = {10.1080/15472450.2014.936284}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jits/AntoniouP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/ShahDJ15, author = {Anand Shah and Shishir Dahake and Sri Hari Haran J.}, title = {Valuing data security and privacy using cyber insurance}, journal = {{SIGCAS} Comput. Soc.}, volume = {45}, number = {1}, pages = {38--41}, year = {2015}, url = {https://doi.org/10.1145/2738210.2738217}, doi = {10.1145/2738210.2738217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/ShahDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/Darbanhosseiniamirkhiz15, author = {Mirmahdi Darbanhosseiniamirkhiz and Shuyuan Deng and Dong{-}Heon Kwak and Greta L. Polites}, title = {The Moderating Role of Espoused National Cultural Values on Perceptions of Privacy Assurance Mechanisms}, booktitle = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto Rico, August 13-15, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/2}, timestamp = {Sun, 13 Dec 2015 13:10:52 +0100}, biburl = {https://dblp.org/rec/conf/amcis/Darbanhosseiniamirkhiz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/0001HBCPPMLHGGB15, author = {Adrian Popescu and Mireille Hildebrandt and Jonas Breuer and Laurence Claeys and Symeon Papadopoulos and Georgios Petkos and Theodoros Michalareas and David Lund and Rob Heyman and Shenja van der Graaf and Etienne Gadeski and Herv{\'{e}} Le Borgne and K. deVries and Timotheos Kastrinogiannis and Apostolos Kousaridas and Ali Padyab}, editor = {Bettina Berendt and Thomas Engel and Demosthenes Ikonomou and Daniel Le M{\'{e}}tayer and Stefan Schiffner}, title = {Increasing Transparency and Privacy for Online Social Network Users - {USEMP} Value Model, Scoring Framework and Legal}, booktitle = {Privacy Technologies and Policy - Third Annual Privacy Forum, {APF} 2015, Luxembourg, October 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9484}, pages = {38--59}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31456-3\_3}, doi = {10.1007/978-3-319-31456-3\_3}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apf/0001HBCPPMLHGGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigda/Barker15, author = {Ken Barker}, editor = {Naveen Kumar and Vasudha Bhatnagar}, title = {Privacy Protection or Data Value: Can We Have Both?}, booktitle = {Big Data Analytics - 4th International Conference, {BDA} 2015, Hyderabad, India, December 15-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9498}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27057-9\_1}, doi = {10.1007/978-3-319-27057-9\_1}, timestamp = {Thu, 23 Jun 2022 19:58:41 +0200}, biburl = {https://dblp.org/rec/conf/bigda/Barker15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/AdamopoulosT15, author = {Panagiotis Adamopoulos and Alexander Tuzhilin}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {The Business Value of Recommendations: {A} Privacy-Preserving Econometric Analysis}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/GeneralIS/12}, timestamp = {Wed, 09 Oct 2019 12:51:34 +0200}, biburl = {https://dblp.org/rec/conf/icis/AdamopoulosT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/AlashoorKLS15, author = {Tawfiq Alashoor and Mark Keil and Leigh Liu and H. Jeff Smith}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {How Values Shape Concerns about Privacy for Self and Others}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/8}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/AlashoorKLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/PuG15, author = {Yu Pu and Jens Grossklags}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/12}, timestamp = {Sun, 13 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/PuG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Cofone15, author = {Ignacio Cofone}, title = {The Value of Privacy: Keeping the Money Where the Mouth is}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_cofone.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/Cofone15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/StarkT14, author = {Luke Stark and Matt Tierney}, title = {Lockbox: mobility, privacy and values in cloud storage}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {1--13}, year = {2014}, url = {https://doi.org/10.1007/s10676-013-9328-z}, doi = {10.1007/S10676-013-9328-Z}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/StarkT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/KeyvanpourM14, author = {Mohammad Reza Keyvanpour and Somayyeh Seifi Moradi}, title = {A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining}, journal = {Int. J. Data Warehous. Min.}, volume = {10}, number = {1}, pages = {55--76}, year = {2014}, url = {https://doi.org/10.4018/ijdwm.2014010104}, doi = {10.4018/IJDWM.2014010104}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdwm/KeyvanpourM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jices/SteevesR14, author = {Valerie Steeves and Priscilla M. Regan}, title = {Young people online and the social value of privacy}, journal = {J. Inf. Commun. Ethics Soc.}, volume = {12}, number = {4}, pages = {298--313}, year = {2014}, url = {https://doi.org/10.1108/JICES-01-2014-0004}, doi = {10.1108/JICES-01-2014-0004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jices/SteevesR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/LiS14, author = {Xiao{-}Bai Li and Sumit Sarkar}, title = {Digression and Value Concatenation to Enable Privacy-Preserving Regression}, journal = {{MIS} Q.}, volume = {38}, number = {3}, pages = {679--698}, year = {2014}, url = {https://doi.org/10.25300/misq/2014/38.3.03}, doi = {10.25300/MISQ/2014/38.3.03}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/LiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/GhazinourRB14, author = {Kambiz Ghazinour and Amir Hossein Razavi and Ken Barker}, title = {A Model for Privacy Compromisation Value}, booktitle = {The 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN-2014)/} The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare {(ICTH} 2014)/ Affiliated Workshops, September 22-25, 2014, Halifax, Nova Scotia, Canada}, series = {Procedia Computer Science}, volume = {37}, pages = {143--152}, publisher = {Elsevier}, year = {2014}, url = {https://doi.org/10.1016/j.procs.2014.08.023}, doi = {10.1016/J.PROCS.2014.08.023}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/euspn/GhazinourRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ZhuTXY14, author = {Hong Zhu and Shengli Tian and Meiyi Xie and Mengyuan Yang}, title = {Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach}, booktitle = {23rd International Conference on Computer Communication and Networks, {ICCCN} 2014, Shanghai, China, August 4-7, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCCN.2014.6911855}, doi = {10.1109/ICCCN.2014.6911855}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ZhuTXY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/MotiwallaLL14, author = {Luvai F. Motiwalla and Xiaobai (Bob) Li and Xiaoping Liu}, editor = {Keng Siau and Qing Li and Xunhua Guo}, title = {Privacy Paradox: Does Stated Privacy Concerns Translate into the Valuation of Personal Information?}, booktitle = {18th Pacific Asia Conference on Information Systems, {PACIS} 2014, Chengdu, China, June 24-28, 2014}, pages = {281}, year = {2014}, url = {http://aisel.aisnet.org/pacis2014/281}, timestamp = {Tue, 25 Nov 2014 12:58:45 +0100}, biburl = {https://dblp.org/rec/conf/pacis/MotiwallaLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/Lieshout14, author = {Marc van Lieshout}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Marit Hansen}, title = {The Value of Personal Data}, booktitle = {Privacy and Identity Management for the Future Internet in the Age of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {457}, pages = {26--38}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-18621-4\_3}, doi = {10.1007/978-3-319-18621-4\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/Lieshout14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/MartinAY14, author = {Yod Samuel Mart{\'{\i}}n and Jos{\'{e}} M. del {\'{A}}lamo and Juan C. Yelmo}, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {Engineering privacy requirements valuable lessons from another realm}, booktitle = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden}, pages = {19--24}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890523}, doi = {10.1109/ESPRE.2014.6890523}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/MartinAY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NaldiD14, author = {Maurizio Naldi and Giuseppe D'Acquisto}, title = {Differential privacy for counting queries: can Bayes estimation help uncover the true value?}, journal = {CoRR}, volume = {abs/1407.0116}, year = {2014}, url = {http://arxiv.org/abs/1407.0116}, eprinttype = {arXiv}, eprint = {1407.0116}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NaldiD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FranzDHJKS13, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure computations on non-integer values with applications to privacy-preserving sequence analysis}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {117--128}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.001}, doi = {10.1016/J.ISTR.2012.10.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FranzDHJKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JainPTU13, author = {Priyank Jain and Neelam Pathak and Pratibha Tapashetti and A. S. Umesh}, title = {Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition}, booktitle = {9th International Conference on Information Assurance and Security, {IAS} 2013, Gammarth, Tunisia, December 4-6, 2013}, pages = {91--95}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISIAS.2013.6947739}, doi = {10.1109/ISIAS.2013.6947739}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/JainPTU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/ChoiJ13, author = {Chun Fung (Ben) Choi and Zhenhui Jiang}, editor = {Richard L. Baskerville and Michael Chau}, title = {Trading Friendship for Value: An Investigation of Collective Privacy Concerns in Social Application Usage}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2013, Milano, Italy, December 15-18, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/81}, timestamp = {Wed, 30 Oct 2019 17:01:36 +0100}, biburl = {https://dblp.org/rec/conf/icis/ChoiJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangJZW13, author = {Wujun Zhang and Shunrong Jiang and Xiaoyan Zhu and Yumin Wang}, title = {Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {358--362}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.67}, doi = {10.1109/INCOS.2013.67}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhangJZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChristinBL13, author = {Delphine Christin and Christian Buchner and Niklas Leibecke}, title = {What's the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications}, booktitle = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013 - Workshop Proceedings}, pages = {918--923}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/LCNW.2013.6758532}, doi = {10.1109/LCNW.2013.6758532}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ChristinBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/HeymanP13, author = {Rob Heyman and Jo Pierson}, editor = {Marit Hansen and Jaap{-}Henk Hoepman and Ronald E. Leenes and Diane Whitehouse}, title = {An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information}, booktitle = {Privacy and Identity Management for Emerging Services and Technologies - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {421}, pages = {203--213}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-55137-6\_16}, doi = {10.1007/978-3-642-55137-6\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/HeymanP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/ChenCKMV13, author = {Yiling Chen and Stephen Chong and Ian A. Kash and Tal Moran and Salil P. Vadhan}, editor = {Michael J. Kearns and R. Preston McAfee and {\'{E}}va Tardos}, title = {Truthful mechanisms for agents that value privacy}, booktitle = {Proceedings of the fourteenth {ACM} Conference on Electronic Commerce, {EC} 2013, Philadelphia, PA, USA, June 16-20, 2013}, pages = {215--232}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2492002.2482549}, doi = {10.1145/2492002.2482549}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/ChenCKMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChhinkaniwalaG13, author = {Hitesh Chhinkaniwala and Sanjay Garg}, title = {Tuple Value Based Multiplicative Data Perturbation Approach To Preserve Privacy In Data Stream Mining}, journal = {CoRR}, volume = {abs/1306.1334}, year = {2013}, url = {http://arxiv.org/abs/1306.1334}, eprinttype = {arXiv}, eprint = {1306.1334}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChhinkaniwalaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/XuCB12, author = {Heng Xu and Robert E. Crossler and France B{\'{e}}langer}, title = {A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers}, journal = {Decis. Support Syst.}, volume = {54}, number = {1}, pages = {424--433}, year = {2012}, url = {https://doi.org/10.1016/j.dss.2012.06.003}, doi = {10.1016/J.DSS.2012.06.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/XuCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/LiW12, author = {Guang Li and Yadong Wang}, title = {A Privacy-Preserving Classification Method Based on Singular Value Decomposition}, journal = {Int. Arab J. Inf. Technol.}, volume = {9}, number = {6}, pages = {529--534}, year = {2012}, url = {http://www.ccis2k.org/iajit/PDF/vol.9\%2cno.6/2990-5.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/LiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChanHD12, author = {Ellen Chan and Robert R. Harmon and Haluk Demirkan}, title = {Privacy and Value Co-creation for IT-Enabled Service Systems: Cui Bono?}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {1573--1582}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.485}, doi = {10.1109/HICSS.2012.485}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ChanHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SpiekermannKB12, author = {Sarah Spiekermann and Jana Korunovska and Christine Bauer}, title = {Psychology of Ownership and Asset Defense: Why people value their personal information beyond privacy}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2012, Orlando, Florida, USA, December 16-19, 2012}, publisher = {Association for Information Systems}, year = {2012}, url = {http://aisel.aisnet.org/icis2012/proceedings/ISSecurity/1}, timestamp = {Sat, 21 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/SpiekermannKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/ZhaoL12, author = {Su{-}Yun Zhao and Si Lin}, title = {Interval valued fuzzy rough classifier and its application on privacy protection}, booktitle = {International Conference on Machine Learning and Cybernetics, {ICMLC} 2012, Xian, Shaanxi, China, July 15-17, 2012, Proceedings}, pages = {255--260}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICMLC.2012.6358921}, doi = {10.1109/ICMLC.2012.6358921}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/ZhaoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idcs/ZhangWQD12, author = {Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo{-}Ferrer}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks}, booktitle = {Internet and Distributed Computing Systems - 5th International Conference, {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7646}, pages = {43--56}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34883-9\_4}, doi = {10.1007/978-3-642-34883-9\_4}, timestamp = {Thu, 09 Mar 2023 09:06:05 +0100}, biburl = {https://dblp.org/rec/conf/idcs/ZhangWQD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangWW12, author = {Xilin Zhang and Yingjie Wu and Xiaodong Wang}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Differential Privacy Data Release through Adding Noise on Average Value}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {417--429}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_32}, doi = {10.1007/978-3-642-34601-9\_32}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/Hugl11, author = {Ulrike Hugl}, title = {Reviewing Person's Value of Privacy of Online Social Networking}, journal = {Internet Res.}, volume = {21}, number = {4}, pages = {384--407}, year = {2011}, url = {https://doi.org/10.1108/10662241111158290}, doi = {10.1108/10662241111158290}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/Hugl11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ChenMFDX11, author = {Rui Chen and Noman Mohammed and Benjamin C. M. Fung and Bipin C. Desai and Li Xiong}, title = {Publishing Set-Valued Data via Differential Privacy}, journal = {Proc. {VLDB} Endow.}, volume = {4}, number = {11}, pages = {1087--1098}, year = {2011}, url = {http://www.vldb.org/pvldb/vol4/p1087-chen.pdf}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ChenMFDX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11, author = {Kirill Levchenko and Andreas Pitsillidis and Neha Chachra and Brandon Enright and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Chris Grier and Tristan Halvorson and Chris Kanich and Christian Kreibich and He Liu and Damon McCoy and Nicholas Weaver and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Click Trajectories: End-to-End Analysis of the Spam Value Chain}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {431--446}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.24}, doi = {10.1109/SP.2011.24}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-5472, author = {Yiling Chen and Stephen Chong and Ian A. Kash and Tal Moran and Salil P. Vadhan}, title = {Truthful Mechanisms for Agents that Value Privacy}, journal = {CoRR}, volume = {abs/1111.5472}, year = {2011}, url = {http://arxiv.org/abs/1111.5472}, eprinttype = {arXiv}, eprint = {1111.5472}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-5472.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datascience/LiW10, author = {Guang Li and Yadong Wang}, title = {A Privacy-Preserving Data Mining Method Based on Singular Value Decomposition and Independent Component Analysis}, journal = {Data Sci. J.}, volume = {9}, pages = {124--132}, year = {2010}, url = {https://doi.org/10.2481/dsj.009-025}, doi = {10.2481/DSJ.009-025}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datascience/LiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/Al-Fedaghi10, author = {Sabah Saleh Al{-}Fedaghi}, title = {Information Privacy and its Value}, booktitle = {Intelligent Information Privacy Management, Papers from the 2010 {AAAI} Spring Symposium, Technical Report SS-10-05, Stanford, California, USA, March 22-24, 2010}, publisher = {{AAAI}}, year = {2010}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1038}, timestamp = {Fri, 17 Feb 2012 13:37:51 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/Al-Fedaghi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/Hugl10, author = {Ulrike Hugl}, editor = {Martin Santana and Jerry N. Luftman and Ajay S. Vinze}, title = {Approaching the value of Privacy: Review of theoretical privacy concepts and aspects of privacy management}, booktitle = {Sustainable {IT} Collaboration Around the Globe. 16th Americas Conference on Information Systems, {AMCIS} 2010, Lima, Peru, August 12-15, 2010}, pages = {248}, publisher = {Association for Information Systems}, year = {2010}, url = {http://aisel.aisnet.org/amcis2010/248}, timestamp = {Mon, 02 Jan 2012 14:47:22 +0100}, biburl = {https://dblp.org/rec/conf/amcis/Hugl10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bncod/Barker10, author = {Ken Barker}, editor = {Lachlan M. MacKinnon}, title = {"Valuing" Privacy While Exposing Data Utility}, booktitle = {Data Security and Security Data - 27th British National Conference on Databases, {BNCOD} 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6121}, pages = {1--2}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25704-9\_1}, doi = {10.1007/978-3-642-25704-9\_1}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bncod/Barker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceb2/Mak10, author = {Stephen Mak}, editor = {Ajay Kumar and David Zhang}, title = {Ethical Values for E-Society: Information, Security and Privacy}, booktitle = {Ethics and Policy of Biometrics - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, {ICEB} 2010, Hong Kong, January 4-5, 2010. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {6005}, pages = {96--101}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12595-9\_13}, doi = {10.1007/978-3-642-12595-9\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/iceb2/Mak10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipmu/Wiese10, author = {Lena Wiese}, editor = {Eyke H{\"{u}}llermeier and Rudolf Kruse and Frank Hoffmann}, title = {Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies}, booktitle = {Computational Intelligence for Knowledge-Based Systems Design, 13th International Conference on Information Processing and Management of Uncertainty, {IPMU} 2010, Dortmund, Germany, June 28 - July 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6178}, pages = {655--664}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14049-5\_67}, doi = {10.1007/978-3-642-14049-5\_67}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipmu/Wiese10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/MotiwallaL10, author = {Luvai F. Motiwalla and Xiaobai (Bob) Li}, title = {Value Added Privacy Services for Healthcare Data}, booktitle = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {64--71}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SERVICES.2010.42}, doi = {10.1109/SERVICES.2010.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/MotiwallaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BezziVLS10, author = {Michele Bezzi and Sabrina De Capitani di Vimercati and Giovanni Livraga and Pierangela Samarati}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner}, title = {Protecting Privacy of Sensitive Value Distributions in Data Release}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {255--270}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_17}, doi = {10.1007/978-3-642-22444-7\_17}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BezziVLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webist/MirallesRG10, author = {Francesc Miralles and Rosa Rudo and Ferran Giones}, editor = {Joaquim Filipe and Jos{\'{e}} Cordeiro}, title = {Cultural Values Influence on the Adoption of Privacy Threatening Social Networks Features}, booktitle = {{WEBIST} 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Volume 2, Valencia, Spain, April 7-10, 2010}, pages = {379--382}, publisher = {{INSTICC} Press}, year = {2010}, timestamp = {Mon, 15 Jun 2015 19:00:08 +0200}, biburl = {https://dblp.org/rec/conf/webist/MirallesRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/RenegarM09, author = {Benjamin D. Renegar and Katina Michael}, title = {Privacy-value-control harmonization for {RFID} adoption in retail}, journal = {{IBM} J. Res. Dev.}, volume = {53}, number = {2}, pages = {8}, year = {2009}, url = {https://doi.org/10.1147/JRD.2009.5429050}, doi = {10.1147/JRD.2009.5429050}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/RenegarM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Birch09, author = {David G. W. Birch}, title = {Victorian values: Politicians and the public incorrectly see security and privacy as opposites}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {3}, pages = {143--145}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2009.10.006}, doi = {10.1016/J.ISTR.2009.10.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Birch09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/HuangHHLSZJZ09, author = {Xin Huang and Yin He and Yifan Hou and Lisi Li and Lan Sun and Sina Zhang and Yang Jiang and Tingting Zhang}, editor = {Martin Gilje Jaatun and Gansen Zhao and Chunming Rong}, title = {Privacy of Value-Added Context-Aware Service Cloud}, booktitle = {Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5931}, pages = {547--552}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10665-1\_50}, doi = {10.1007/978-3-642-10665-1\_50}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/HuangHHLSZJZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/WasserZ09, author = {Benjamin Wasser and Justin Zhan}, title = {Practical Values for Privacy}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {343--346}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.477}, doi = {10.1109/CSE.2009.477}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/WasserZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DinevXS09, author = {Tamara Dinev and Heng Xu and H. Jeff Smith}, title = {Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy}, booktitle = {42st Hawaii International International Conference on Systems Science {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January 2009, Waikoloa, Big Island, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HICSS.2009.255}, doi = {10.1109/HICSS.2009.255}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DinevXS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/HanNY09, author = {Shuguo Han and Wee Keong Ng and Philip S. Yu}, editor = {Yannis E. Ioannidis and Dik Lun Lee and Raymond T. Ng}, title = {Privacy-Preserving Singular Value Decomposition}, booktitle = {Proceedings of the 25th International Conference on Data Engineering, {ICDE} 2009, March 29 2009 - April 2 2009, Shanghai, China}, pages = {1267--1270}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDE.2009.217}, doi = {10.1109/ICDE.2009.217}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/HanNY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/KrasnovaHG09, author = {Hanna Krasnova and Thomas Hildebrand and Oliver G{\"{u}}nther}, editor = {Jay F. Nunamaker Jr. and Wendy L. Currie}, title = {Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2009, Phoenix, Arizona, USA, December 15-18, 2009}, pages = {173}, publisher = {Association for Information Systems}, year = {2009}, url = {http://aisel.aisnet.org/icis2009/173}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/KrasnovaHG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/BertholdB09, author = {Stefan Berthold and Rainer B{\"{o}}hme}, title = {Valuating Privacy with Option Pricing Theory}, booktitle = {8th Annual Workshop on the Economics of Information Security, {WEIS} 2009, University College London, England, UK, June 24-25, 2009}, year = {2009}, url = {http://weis09.infosecon.net/files/128/index.html}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/BertholdB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/TerrovitisMK08, author = {Manolis Terrovitis and Nikos Mamoulis and Panos Kalnis}, title = {Privacy-preserving anonymization of set-valued data}, journal = {Proc. {VLDB} Endow.}, volume = {1}, number = {1}, pages = {115--125}, year = {2008}, url = {http://www.vldb.org/pvldb/vol1/1453874.pdf}, doi = {10.14778/1453856.1453874}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/TerrovitisMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/XuIZX08, author = {Heng Xu and Nazneen Irani and Sencun Zhu and Wei Xu}, title = {Alleviating Parental Concerns for Children's Online Privacy: {A} Value Sensitive Design Investigation}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2008, Paris, France, December 14-17, 2008}, pages = {106}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/icis2008/106}, timestamp = {Wed, 28 Dec 2011 12:50:25 +0100}, biburl = {https://dblp.org/rec/conf/icis/XuIZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wafr/OKane08, author = {Jason M. O'Kane}, editor = {Howie Choset and Marco Morales and Todd D. Murphey}, title = {On the Value of Ignorance: Balancing Tracking and Privacy Using a Two-Bit Sensor}, booktitle = {Algorithmic Foundation of Robotics VIII, Selected Contributions of the Eight International Workshop on the Algorithmic Foundations of Robotics, {WAFR} 2008, Guanajuato, Mexico, December 7-9, 2008}, series = {Springer Tracts in Advanced Robotics}, volume = {57}, pages = {235--249}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00312-7\_15}, doi = {10.1007/978-3-642-00312-7\_15}, timestamp = {Fri, 04 Feb 2022 12:19:08 +0100}, biburl = {https://dblp.org/rec/conf/wafr/OKane08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/HuiTL07, author = {Kai Lung Hui and Hock{-}Hai Teo and Sang{-}Yong Tom Lee}, title = {The Value of Privacy Assurance: An Exploratory Field Experiment}, journal = {{MIS} Q.}, volume = {31}, number = {1}, pages = {19--33}, year = {2007}, url = {http://misq.org/the-value-of-privacy-assurance-an-exploratory-field-experiment.html}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/misq/HuiTL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/RiceD07, author = {Daniel Rice and John D'Arcy}, editor = {John A. Hoxmeier and Stephen C. Hayne}, title = {A Personal Information Auction: Measuring the Differential Value of Privacy}, booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems, {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007}, pages = {206}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/amcis2007/206}, timestamp = {Thu, 26 Nov 2020 16:35:40 +0100}, biburl = {https://dblp.org/rec/conf/amcis/RiceD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijar/WangLHC06, author = {Da{-}Wei Wang and Churn{-}Jung Liau and Tsan{-}sheng Hsu and Jeremy K.{-}P. Chen}, title = {Value versus damage of information release: {A} data privacy perspective}, journal = {Int. J. Approx. Reason.}, volume = {43}, number = {2}, pages = {179--201}, year = {2006}, url = {https://doi.org/10.1016/j.ijar.2006.04.002}, doi = {10.1016/J.IJAR.2006.04.002}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijar/WangLHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/XuZHW06, author = {Shuting Xu and Jun Zhang and Dianwei Han and Jie Wang}, title = {Singular value decomposition based data distortion strategy for privacy protection}, journal = {Knowl. Inf. Syst.}, volume = {10}, number = {3}, pages = {383--397}, year = {2006}, url = {https://doi.org/10.1007/s10115-006-0001-2}, doi = {10.1007/S10115-006-0001-2}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/XuZHW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieRO06, author = {Yinglian Xie and Michael K. Reiter and David R. O'Hallaron}, title = {Protecting Privacy in Key-Value Search Systems}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {493--504}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.43}, doi = {10.1109/ACSAC.2006.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieRO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/SongHC06, author = {Won Jay Song and Im Sook H{\'{a}} and Mun Kee Choi}, editor = {Laurence Tianruo Yang and Hai Jin and Jianhua Ma and Theo Ungerer}, title = {System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks}, booktitle = {Autonomic and Trusted Computing, Third International Conference, {ATC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4158}, pages = {511--520}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11839569\_50}, doi = {10.1007/11839569\_50}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/SongHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/FriedmanSKCS06, author = {Batya Friedman and Ian E. Smith and Peter H. Kahn Jr. and Sunny Consolvo and Jaina Selawski}, editor = {Paul Dourish and Adrian Friday}, title = {Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry}, booktitle = {UbiComp 2006: Ubiquitous Computing, 8th International Conference, UbiComp 2006, Orange County, CA, USA, September 17-21, 2006}, series = {Lecture Notes in Computer Science}, volume = {4206}, pages = {194--211}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11853565\_12}, doi = {10.1007/11853565\_12}, timestamp = {Sun, 02 Jun 2019 21:25:01 +0200}, biburl = {https://dblp.org/rec/conf/huc/FriedmanSKCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/WangZZ06, author = {Jie Wang and Weijun Zhong and Jun Zhang}, title = {NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets}, booktitle = {Workshops Proceedings of the 6th {IEEE} International Conference on Data Mining {(ICDM} 2006), 18-22 December 2006, Hong Kong, China}, pages = {513--517}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDMW.2006.123}, doi = {10.1109/ICDMW.2006.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/WangZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/DuanC06, author = {Yitao Duan and John F. Canny}, title = {From Commodity to Value: {A} Privacy-Preserving e-Business Architecture}, booktitle = {2006 {IEEE} International Conference on e-Business Engineering {(ICEBE} 2006), 24-26 October 2006, Shanghai, China}, pages = {488--495}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICEBE.2006.53}, doi = {10.1109/ICEBE.2006.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/DuanC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicic/SaitoNS06, author = {Mitsutoshi Saito and Yusuke Namba and Seiichi Serikawa}, title = {Extraction of the Value Representing Human Feature for the Development of the Sensor with the Function of Privacy-Protection and the Construction of Discrimination-Circuit}, booktitle = {First International Conference on Innovative Computing, Information and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing, China}, pages = {660--663}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICICIC.2006.274}, doi = {10.1109/ICICIC.2006.274}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icicic/SaitoNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/CvrcekKMD06, author = {Daniel Cvrcek and Marek Kumpost and Vashek Matyas and George Danezis}, editor = {Ari Juels and Marianne Winslett}, title = {A study on the value of location privacy}, booktitle = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006}, pages = {109--118}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179601.1179621}, doi = {10.1145/1179601.1179621}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/CvrcekKMD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HubermanAF05, author = {Bernardo A. Huberman and Eytan Adar and Leslie R. Fine}, title = {Valuating Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {5}, pages = {22--25}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.137}, doi = {10.1109/MSP.2005.137}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HubermanAF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/EarpAAS05, author = {Julia Brande Earp and Annie I. Ant{\'{o}}n and Lynda Aiman{-}Smith and William H. Stufflebeam}, title = {Examining Internet privacy policies within the context of user privacy values}, journal = {{IEEE} Trans. Engineering Management}, volume = {52}, number = {2}, pages = {227--237}, year = {2005}, url = {https://doi.org/10.1109/TEM.2005.844927}, doi = {10.1109/TEM.2005.844927}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tem/EarpAAS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/MaheswaranPVBT05, author = {Rajiv T. Maheswaran and Jonathan P. Pearce and Pradeep Varakantham and Emma Bowring and Milind Tambe}, title = {Valuations of Possible States {(VPS):} {A} Quantitative Framework for Analysis of Privacy Loss Among Collaborative Personal Assistant Agents}, booktitle = {Persistent Assistants: Living and Working with AI, Papers from the 2005 {AAAI} Spring Symposium, Technical Report SS-05-05, Stanford, California, USA, March 21-23, 2005}, pages = {60--67}, publisher = {{AAAI}}, year = {2005}, url = {http://www.aaai.org/Library/Symposia/Spring/2005/ss05-05-011.php}, timestamp = {Sat, 18 Feb 2012 12:26:52 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/MaheswaranPVBT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MaheswaranPVBT05, author = {Rajiv T. Maheswaran and Jonathan P. Pearce and Pradeep Varakantham and Emma Bowring and Milind Tambe}, editor = {Frank Dignum and Virginia Dignum and Sven Koenig and Sarit Kraus and Munindar P. Singh and Michael J. Wooldridge}, title = {Valuations of Possible States {(VPS):} a quantitative framework for analysis of privacy loss among collaborative personal assistant agents}, booktitle = {4th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2005), July 25-29, 2005, Utrecht, The Netherlands}, pages = {1030--1037}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1082473.1082629}, doi = {10.1145/1082473.1082629}, timestamp = {Fri, 26 Apr 2019 14:26:42 +0200}, biburl = {https://dblp.org/rec/conf/atal/MaheswaranPVBT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/Otterloo05, author = {Sieuwert van Otterloo}, editor = {Frank Dignum and Virginia Dignum and Sven Koenig and Sarit Kraus and Munindar P. Singh and Michael J. Wooldridge}, title = {The value of privacy: optimal strategies for privacy minded agents}, booktitle = {4th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2005), July 25-29, 2005, Utrecht, The Netherlands}, pages = {1015--1022}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1082473.1082627}, doi = {10.1145/1082473.1082627}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/Otterloo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icita/ChenLH05, author = {Chun{-}Hua Chen and Chi{-}Min Lan and Gwoboa Horng}, title = {Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme}, booktitle = {Third International Conference on Information Technology and Applications {(ICITA} 2005), 4-7 July 2005, Sydney, Australia}, pages = {580--583}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICITA.2005.222}, doi = {10.1109/ICITA.2005.222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icita/ChenLH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/HubermanAF05, author = {Bernardo A. Huberman and Eytan Adar and Leslie R. Fine}, title = {Valuating Privacy}, booktitle = {4th Annual Workshop on the Economics of Information Security, {WEIS} 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005}, year = {2005}, url = {http://infosecon.net/workshop/pdf/7.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/HubermanAF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Sand05, author = {Peter E. Sand}, title = {The Privacy Value}, booktitle = {4th Annual Workshop on the Economics of Information Security, {WEIS} 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005}, year = {2005}, url = {http://infosecon.net/workshop/pdf/privacy\_value.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/Sand05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/WathieuF05, author = {Luc Wathieu and Allan Friedman}, title = {An empirical approach to the valuing privacy valuation}, booktitle = {4th Annual Workshop on the Economics of Information Security, {WEIS} 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005}, year = {2005}, url = {http://infosecon.net/workshop/pdf/WathFried\_WEIS05.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/WathieuF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VenkateshSRSS05, author = {R. Venkatesh and C. Sanjeevakumar and M. Kasi Rajan and L. Sudarsan and N. Srinivasan}, title = {A {QKD} Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2005}, url = {http://eprint.iacr.org/2005/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VenkateshSRSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChidaKM04, author = {Koji Chida and Kunio Kobayashi and Hikaru Morita}, title = {An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {173--181}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_173\&category=D\&year=2004\&lang=E\&abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ChidaKM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/EngbergHJ04, author = {Stephan J. Engberg and Morten Borup Harning and Christian Damsgaard Jensen}, title = {Zero-knowledge Device Authentication: Privacy {\&} Security Enhanced {RFID} preserving Business Value and Consumer Convenience}, booktitle = {Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings}, pages = {89--101}, year = {2004}, url = {http://dev.hil.unb.ca/Texts/PST/pdf/engberg.pdf}, timestamp = {Tue, 07 Mar 2006 13:49:03 +0100}, biburl = {https://dblp.org/rec/conf/pst/EngbergHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/EarpPB04, author = {Julia Brande Earp and J. C. Poindexter and David L. Baumer}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Modeling privacy values with experimental economics}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {25}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029185}, doi = {10.1145/1029179.1029185}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/EarpPB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itp/ZakariaSS03, author = {Norhayati Zakaria and Jeffrey M. Stanton and Shreya T. M. Sarkar{-}Barney}, title = {Designing and implementing culturally-sensitive {IT} applications: The interaction of culture values and privacy issues in the Middle East}, journal = {Inf. Technol. People}, volume = {16}, number = {1}, pages = {49--75}, year = {2003}, url = {https://doi.org/10.1108/09593840310463023}, doi = {10.1108/09593840310463023}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itp/ZakariaSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LichtensteinSB03, author = {Sharman Lichtenstein and Paula M. C. Swatman and Kanchan Babu}, title = {Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac}, booktitle = {36th Hawaii International Conference on System Sciences {(HICSS-36} 2003), {CD-ROM} / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, {USA}}, pages = {206}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/HICSS.2003.1174470}, doi = {10.1109/HICSS.2003.1174470}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LichtensteinSB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CazierSL03, author = {Joseph A. Cazier and Benjamin B. M. Shao and Robert St. Louis}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {617--622}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952654}, doi = {10.1145/952532.952654}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/CazierSL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jilt/KennyB02, author = {Steve Kenny and John J. Borking}, title = {The Value of Privacy Engineering}, journal = {J. Inf. Law Technol.}, volume = {2002}, number = {1}, year = {2002}, url = {http://elj.warwick.ac.uk/jilt/02-1/kenny.html}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jilt/KennyB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/DhillonBH02, author = {Gurpreet Dhillon and John Bardacino and Raymond A. Hackney}, editor = {Francesc Miralles and Josep Valor}, title = {Value Focused Assessment of Individual Privacy Concerns for Internet Commerce}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2002, Barcelona, Spain, December 15-18, 2002}, pages = {67}, publisher = {Association for Information Systems}, year = {2002}, url = {http://aisel.aisnet.org/icis2002/67}, timestamp = {Mon, 21 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/DhillonBH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/AntonEAP01, author = {Annie I. Ant{\'{o}}n and Julia Brande Earp and Thomas A. Alspaugh and Colin Potts}, title = {The Role of Policy and Stakeholder Privacy Values in Requirements Engineering}, booktitle = {5th {IEEE} International Symposium on Requirements Engineering {(RE} 2001), 27-31 August 2001, Toronto, Canada}, pages = {138--145}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ISRE.2001.948553}, doi = {10.1109/ISRE.2001.948553}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/AntonEAP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Poore00a, author = {Ralph Spencer Poore}, title = {Privacy and the Value of Personal Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {9}, number = {3}, pages = {1--6}, year = {2000}, url = {https://doi.org/10.1201/1086/43310.9.3.20000708/31357.3}, doi = {10.1201/1086/43310.9.3.20000708/31357.3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Poore00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MilbergBSK95, author = {Sandra J. Milberg and Sandra J. Burke and H. Jeff Smith and Ernest A. Kallman}, title = {Values, Personal Information Privacy, and Regulatory Approaches}, journal = {Commun. {ACM}}, volume = {38}, number = {12}, pages = {65--74}, year = {1995}, url = {https://doi.org/10.1145/219663.219683}, doi = {10.1145/219663.219683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MilbergBSK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Swaay95, author = {Maarten van Swaay}, title = {The value and protection of privacy}, journal = {Comput. Networks {ISDN} Syst.}, volume = {26}, number = {Supplement-4}, pages = {S149--S155}, year = {1995}, url = {https://doi.org/10.1016/0169-7552(95)90002-0}, doi = {10.1016/0169-7552(95)90002-0}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Swaay95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.