Search dblp for Publications

export results for "value privacy"

 download as .bib file

@article{DBLP:journals/access/LiuZZH24a,
  author       = {Chao Liu and
                  Zhaolong Zhi and
                  Weinan Zhao and
                  Zhicheng He},
  title        = {Research on Fingerprint Image Differential Privacy Protection Publishing
                  Method Based on Wavelet Transform and Singular Value Decomposition
                  Technology},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {28417--28436},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3367996},
  doi          = {10.1109/ACCESS.2024.3367996},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuZZH24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ZhangCGWK24,
  author       = {Xiao{-}Yu Zhang and
                  Jos{\'{e}}{-}Rodrigo C{\'{o}}rdoba{-}Pach{\'{o}}n and
                  Peiqian Guo and
                  Chris Watkins and
                  Stefanie Kuenzel},
  title        = {Privacy-Preserving Federated Learning for Value-Added Service Model
                  in Advanced Metering Infrastructure},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {117--131},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2022.3204361},
  doi          = {10.1109/TCSS.2022.3204361},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcss/ZhangCGWK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TihanyiBBR24,
  author       = {Norbert Tihanyi and
                  Tam{\'{a}}s Bisztray and
                  Bertalan Borsos and
                  Sebastien Raveau},
  title        = {Privacy-Preserving Password Cracking: How a Third Party Can Crack
                  Our Password Hash Without Learning the Hash Value or the Cleartext},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2981--2996},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356162},
  doi          = {10.1109/TIFS.2024.3356162},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TihanyiBBR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuCXWZ24,
  author       = {Youwen Zhu and
                  Yiran Cao and
                  Qiao Xue and
                  Qihui Wu and
                  Yushu Zhang},
  title        = {Heavy Hitter Identification Over Large-Domain Set-Valued Data With
                  Local Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {414--426},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324726},
  doi          = {10.1109/TIFS.2023.3324726},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuCXWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconference/ChenY24,
  author       = {Xiaoyu Chen and
                  Ruoxi Yang},
  editor       = {Isaac Sserwanga and
                  Hideo Joho and
                  Jie Ma and
                  Preben Hansen and
                  Dan Wu and
                  Masanori Koizumi and
                  Anne J. Gilliland},
  title        = {Understanding Users' Decision-Making on Privacy Disclosure from a
                  Configurational Perspective Perceived Values, Privacy Concerns, Cognitive
                  Style, and Trust},
  booktitle    = {Wisdom, Well-Being, Win-Win - 19th International Conference, iConference
                  2024, Changchun, China, April 15-26, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14596},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57850-2\_8},
  doi          = {10.1007/978-3-031-57850-2\_8},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconference/ChenY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/anor/DuanXH23,
  author       = {Yongrui Duan and
                  Yuncong Xie and
                  Yihong Hu},
  title        = {The value of personal information in vertically differentiated markets
                  with privacy concerns},
  journal      = {Ann. Oper. Res.},
  volume       = {329},
  number       = {1},
  pages        = {425--469},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10479-020-03794-3},
  doi          = {10.1007/S10479-020-03794-3},
  timestamp    = {Sat, 02 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/anor/DuanXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/WangMTS23,
  author       = {Lei Wang and
                  Ian R. Manchester and
                  Jochen Trumpf and
                  Guodong Shi},
  title        = {Differential initial-value privacy and observability of linear dynamical
                  systems},
  journal      = {Autom.},
  volume       = {148},
  pages        = {110722},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.automatica.2022.110722},
  doi          = {10.1016/J.AUTOMATICA.2022.110722},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/WangMTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LiuLCL23,
  author       = {Huan Liu and
                  Kai Li and
                  Yan Chen and
                  Xin (Robert) Luo},
  title        = {Is personally identifiable information really more valuable? Evidence
                  from consumers' willingness-to-accept valuation of their privacy information},
  journal      = {Decis. Support Syst.},
  volume       = {173},
  pages        = {114010},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dss.2023.114010},
  doi          = {10.1016/J.DSS.2023.114010},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LiuLCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/WuRPYG23,
  author       = {Haonan Wu and
                  Ruisheng Ran and
                  Shunshun Peng and
                  Mengmeng Yang and
                  Taolin Guo},
  title        = {Mining frequent items from high-dimensional set-valued data under
                  local differential privacy protection},
  journal      = {Expert Syst. Appl.},
  volume       = {234},
  pages        = {121105},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.121105},
  doi          = {10.1016/J.ESWA.2023.121105},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/WuRPYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhuHNZXDJ23,
  author       = {Kun Zhu and
                  Lu Huang and
                  Jiangtian Nie and
                  Yang Zhang and
                  Zehui Xiong and
                  Hong{-}Ning Dai and
                  Jiangming Jin},
  title        = {Privacy-Aware Double Auction With Time-Dependent Valuation for Blockchain-Based
                  Dynamic Spectrum Sharing in IoT Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {8, April 15},
  pages        = {6756--6768},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3165819},
  doi          = {10.1109/JIOT.2022.3165819},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhuHNZXDJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhuTYFP23,
  author       = {Hui Zhu and
                  Xiaohu Tang and
                  Laurence Tianruo Yang and
                  Chao Fu and
                  Shuangrong Peng},
  title        = {Key-value data collection and statistical analysis with local differential
                  privacy},
  journal      = {Inf. Sci.},
  volume       = {640},
  pages        = {119058},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119058},
  doi          = {10.1016/J.INS.2023.119058},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhuTYFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SeiOOO23,
  author       = {Yuichi Sei and
                  J. Andrew Onesimu and
                  Hiroshi Okumura and
                  Akihiko Ohsuga},
  title        = {Privacy-Preserving Collaborative Data Collection and Analysis With
                  Many Missing Values},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2158--2173},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3174887},
  doi          = {10.1109/TDSC.2022.3174887},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SeiOOO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YeHMZHFS23,
  author       = {Qingqing Ye and
                  Haibo Hu and
                  Xiaofeng Meng and
                  Huadi Zheng and
                  Kai Huang and
                  Chengfang Fang and
                  Jie Shi},
  title        = {PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential
                  Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {17--35},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3107512},
  doi          = {10.1109/TDSC.2021.3107512},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YeHMZHFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Qian00HC023,
  author       = {Qiuyu Qian and
                  Qingqing Ye and
                  Haibo Hu and
                  Kai Huang and
                  Tom Tak{-}Lam Chan and
                  Jin Li},
  title        = {Collaborative Sampling for Partial Multi-Dimensional Value Collection
                  Under Local Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3948--3961},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3289007},
  doi          = {10.1109/TIFS.2023.3289007},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Qian00HC023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMdis/WongVACQP23,
  author       = {Richmond Y. Wong and
                  Jason Caleb Valdez and
                  Ashten Alexander and
                  Ariel Chiang and
                  Olivia Quesada and
                  James Pierce},
  editor       = {Daragh Byrne and
                  Nikolas Martelaro and
                  Andy Boucher and
                  David J. Chatting and
                  Sarah Fdili Alaoui and
                  Sarah E. Fox and
                  Iohanna Nicenboim and
                  Cayley MacArthur},
  title        = {Broadening Privacy and Surveillance: Eliciting Interconnected Values
                  with a Scenarios Workbook on Smart Home Cameras},
  booktitle    = {Proceedings of the 2023 {ACM} Designing Interactive Systems Conference,
                  {DIS} 2023, Pittsburgh, PA, USA, July 10-14, 2023},
  pages        = {1093--1113},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3563657.3596012},
  doi          = {10.1145/3563657.3596012},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMdis/WongVACQP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/HorigomeKY23,
  author       = {Hikaru Horigome and
                  Hiroaki Kikuchi and
                  Chia{-}Mu Yu},
  editor       = {Leonard Barolli},
  title        = {Expectation-Maximization Estimation for Key-Value Data Randomized
                  with Local Differential Privacy},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 37th International Conference on Advanced Information Networking
                  and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023,
                  Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {654},
  pages        = {501--512},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28451-9\_44},
  doi          = {10.1007/978-3-031-28451-9\_44},
  timestamp    = {Thu, 16 Mar 2023 10:11:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/HorigomeKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/Dhillon23,
  author       = {Simran Dhillon},
  editor       = {Paul A. Pavlou and
                  Vishal Midha and
                  Animesh Animesh and
                  Traci A. Carte and
                  Alexandre R. Graeml and
                  Alanah Mitchell},
  title        = {Value-Driven Policy Agenda to Manage Online Privacy of Young Adults},
  booktitle    = {29th Americas Conference on Information Systems, {AMCIS} 2023, Panama
                  City, Panama, August 10-12, 2023},
  publisher    = {Association for Information Systems},
  year         = {2023},
  url          = {https://aisel.aisnet.org/amcis2023/sig\_sec/sig\_sec/15},
  timestamp    = {Wed, 19 Jul 2023 08:55:10 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/Dhillon23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btw/RohdeFCR23,
  author       = {Florens Rohde and
                  Martin Franke and
                  Victor Christen and
                  Erhard Rahm},
  editor       = {Birgitta K{\"{o}}nig{-}Ries and
                  Stefanie Scherzinger and
                  Wolfgang Lehner and
                  Gottfried Vossen},
  title        = {Value-specific Weighting for Record-level Encodings in Privacy-Preserving
                  Record Linkage},
  booktitle    = {Datenbanksysteme f{\"{u}}r Business, Technologie und Web {(BTW}
                  2023), 20. Fachtagung des GI-Fachbereichs ,,Datenbanken und Informationssysteme"
                  (DBIS), 06.-10, M{\"{a}}rz 2023, Dresden, Germany, Proceedings},
  series       = {{LNI}},
  volume       = {{P-331}},
  pages        = {439--460},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2023},
  url          = {https://doi.org/10.18420/BTW2023-21},
  doi          = {10.18420/BTW2023-21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btw/RohdeFCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MustafaAHHDK23,
  author       = {Maryam Mustafa and
                  Abdul Moeed Asad and
                  Shehrbano Hassan and
                  Urooj Haider and
                  Zainab Durrani and
                  Katharina Krombholz},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Pakistani Teens and Privacy - How Gender Disparities, Religion and
                  Family Values Impact the Privacy Design Space},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {195--209},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623087},
  doi          = {10.1145/3576915.3623087},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MustafaAHHDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/GohariHT23,
  author       = {Parham Gohari and
                  Matthew T. Hale and
                  Ufuk Topcu},
  title        = {Privacy-Engineered Value Decomposition Networks for Cooperative Multi-Agent
                  Reinforcement Learning},
  booktitle    = {62nd {IEEE} Conference on Decision and Control, {CDC} 2023, Singapore,
                  December 13-15, 2023},
  pages        = {8038--8044},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CDC49753.2023.10384184},
  doi          = {10.1109/CDC49753.2023.10384184},
  timestamp    = {Mon, 29 Jan 2024 17:30:32 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/GohariHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HasanWSK23,
  author       = {Rakibul Hasan and
                  Rebecca Weil and
                  Rudolf Siegel and
                  Katharina Krombholz},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {A Psychometric Scale to Measure Individuals' Value of Other People's
                  Privacy {(VOPP)}},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {581:1--581:14},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581496},
  doi          = {10.1145/3544548.3581496},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HasanWSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HothKLB23,
  author       = {Veronica Hoth and
                  Anne Elisabeth Kr{\"{u}}ger and
                  Moritz Langner and
                  Stefan Brandenburg},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters},
  title        = {Ethical Experience Design for the Value of Privacy based on Psychological
                  Needs},
  booktitle    = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28,
                  2023},
  pages        = {537:1--537:4},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544549.3574166},
  doi          = {10.1145/3544549.3574166},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HothKLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/XueST23,
  author       = {Weihao Xue and
                  Yingpeng Sang and
                  Hui Tian},
  editor       = {Christine Strauss and
                  Toshiyuki Amagasa and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {{LHKV:} {A} Key-Value Data Collection Mechanism Under Local Differential
                  Privacy},
  booktitle    = {Database and Expert Systems Applications - 34th International Conference,
                  {DEXA} 2023, Penang, Malaysia, August 28-30, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14146},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39847-6\_16},
  doi          = {10.1007/978-3-031-39847-6\_16},
  timestamp    = {Sat, 30 Sep 2023 09:38:52 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/XueST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gerupa/KrugerHB23,
  author       = {Anne Elisabeth Kr{\"{u}}ger and
                  Veronica Hoth and
                  Stefan Brandenburg},
  title        = {How to Design for Ethical Experiences: Introduction of a Guided Method
                  based on Psychological Needs for the Value of Privacy},
  booktitle    = {Usability Professionals 2023, Rapperswil, Schweiz, September 3-6,
                  2023},
  pages        = {427},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V. und German {UPA} e.V.},
  year         = {2023},
  url          = {https://doi.org/10.18420/muc2023-up-427},
  doi          = {10.18420/MUC2023-UP-427},
  timestamp    = {Mon, 11 Dec 2023 17:13:58 +0100},
  biburl       = {https://dblp.org/rec/conf/gerupa/KrugerHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/UkilMJ23,
  author       = {Arijit Ukil and
                  Leandro Mar{\'{\i}}n and
                  Antonio J. Jara},
  title        = {Priv-Aug-Shap-ECGResNet: Privacy Preserving Shapley-Value Attributed
                  Augmented Resnet for Practical Single-Lead Electrocardiogram Classification},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing
                  {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICASSP49357.2023.10096437},
  doi          = {10.1109/ICASSP49357.2023.10096437},
  timestamp    = {Sun, 05 Nov 2023 16:51:21 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/UkilMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/RahmanP23,
  author       = {Md. Mahmudur Rahman and
                  Sanjay Purushotham},
  editor       = {Ambuj K. Singh and
                  Yizhou Sun and
                  Leman Akoglu and
                  Dimitrios Gunopulos and
                  Xifeng Yan and
                  Ravi Kumar and
                  Fatma Ozcan and
                  Jieping Ye},
  title        = {FedPseudo: Privacy-Preserving Pseudo Value-Based Deep Learning Models
                  for Federated Survival Analysis},
  booktitle    = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023},
  pages        = {1999--2009},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580305.3599348},
  doi          = {10.1145/3580305.3599348},
  timestamp    = {Mon, 25 Sep 2023 08:29:22 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/RahmanP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdai/HorigomeKY23,
  author       = {Hikaru Horigome and
                  Hiroaki Kikuchi and
                  Chia{-}Mu Yu},
  editor       = {Vicen{\c{c}} Torra and
                  Yasuo Narukawa},
  title        = {Local Differential Privacy Protocol for Making Key-Value Data Robust
                  Against Poisoning Attacks},
  booktitle    = {Modeling Decisions for Artificial Intelligence - 20th International
                  Conference, {MDAI} 2023, Ume{\aa}, Sweden, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13890},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33498-6\_17},
  doi          = {10.1007/978-3-031-33498-6\_17},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mdai/HorigomeKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Wang00JM23,
  author       = {Jiachen T. Wang and
                  Yuqing Zhu and
                  Yu{-}Xiang Wang and
                  Ruoxi Jia and
                  Prateek Mittal},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {A Privacy-Friendly Approach to Data Valuation},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/bdd5522a32b3a959a6d81fb6ddc1cb38-Abstract-Conference.html},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Wang00JM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/AstfalkS23,
  author       = {Stefanie Astfalk and
                  Christian H. Schunck},
  editor       = {Heiko Ro{\ss}nagel and
                  Christian H. Schunck and
                  Jochen G{\"{u}}nther},
  title        = {Balancing Privacy and Value Creation in the Platform Economy: The
                  Role of Transparency and Intervenability},
  booktitle    = {Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023},
  series       = {{LNI}},
  volume       = {{P-335}},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2023},
  url          = {https://doi.org/10.18420/OID2023\_12},
  doi          = {10.18420/OID2023\_12},
  timestamp    = {Tue, 04 Jul 2023 17:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/AstfalkS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/LinS23,
  author       = {Tesary Lin and
                  Avner Strulov{-}Shlain},
  editor       = {Kevin Leyton{-}Brown and
                  Jason D. Hartline and
                  Larry Samuelson},
  title        = {Choice Architecture, Privacy Valuations, and Selection Bias in Consumer
                  Data},
  booktitle    = {Proceedings of the 24th {ACM} Conference on Economics and Computation,
                  {EC} 2023, London, United Kingdom, July 9-12, 2023},
  pages        = {960},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580507.3597674},
  doi          = {10.1145/3580507.3597674},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigecom/LinS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchmittLPS023,
  author       = {Vera Schmitt and
                  Zhenni Li and
                  Maija Poikela and
                  Robert P. Spang and
                  Sebastian M{\"{o}}ller},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {What is Your Location Privacy Worth? Monetary Valuation of Different
                  Location Types and Privacy Influencing Factors},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {19--29},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590180},
  doi          = {10.1145/3558482.3590180},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchmittLPS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-13336,
  author       = {Justin Singh Kang and
                  Ramtin Pedarsani and
                  Kannan Ramchandran},
  title        = {The Fair Value of Data Under Heterogeneous Privacy Constraints},
  journal      = {CoRR},
  volume       = {abs/2301.13336},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.13336},
  doi          = {10.48550/ARXIV.2301.13336},
  eprinttype    = {arXiv},
  eprint       = {2301.13336},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-13336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09624,
  author       = {Richeng Jin and
                  Zhonggen Su and
                  Caijun Zhong and
                  Zhaoyang Zhang and
                  Tony Q. S. Quek and
                  Huaiyu Dai},
  title        = {On the f-Differential Privacy Guarantees of Discrete-Valued Mechanisms},
  journal      = {CoRR},
  volume       = {abs/2302.09624},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09624},
  doi          = {10.48550/ARXIV.2302.09624},
  eprinttype    = {arXiv},
  eprint       = {2302.09624},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08740,
  author       = {Norbert Tihanyi and
                  Tam{\'{a}}s Bisztray and
                  Bertalan Borsos and
                  Sebastien Raveau},
  title        = {Privacy-Preserving Password Cracking: How a Third Party Can Crack
                  Our Password Hash Without Learning the Hash Value or the Cleartext},
  journal      = {CoRR},
  volume       = {abs/2306.08740},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08740},
  doi          = {10.48550/ARXIV.2306.08740},
  eprinttype    = {arXiv},
  eprint       = {2306.08740},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08740.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-05700,
  author       = {Sarah E. Carter and
                  Mathieu d'Aquin and
                  Dayana Spagnuelo and
                  Ilaria Tiddi and
                  Kathryn Cormican and
                  Heike Felzmann},
  title        = {The Privacy-Value-App Relationship and the Value-Centered Privacy
                  Assistant},
  journal      = {CoRR},
  volume       = {abs/2308.05700},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.05700},
  doi          = {10.48550/ARXIV.2308.05700},
  eprinttype    = {arXiv},
  eprint       = {2308.05700},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-05700.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-15709,
  author       = {Jiachen T. Wang and
                  Yuqing Zhu and
                  Yu{-}Xiang Wang and
                  Ruoxi Jia and
                  Prateek Mittal},
  title        = {Threshold KNN-Shapley: {A} Linear-Time and Privacy-Friendly Approach
                  to Data Valuation},
  journal      = {CoRR},
  volume       = {abs/2308.15709},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.15709},
  doi          = {10.48550/ARXIV.2308.15709},
  eprinttype    = {arXiv},
  eprint       = {2308.15709},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-15709.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-06255,
  author       = {Parham Gohari and
                  Matthew T. Hale and
                  Ufuk Topcu},
  title        = {Privacy-Engineered Value Decomposition Networks for Cooperative Multi-Agent
                  Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2311.06255},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.06255},
  doi          = {10.48550/ARXIV.2311.06255},
  eprinttype    = {arXiv},
  eprint       = {2311.06255},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-06255.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/digitalsociety/Carter22,
  author       = {Sarah E. Carter},
  title        = {A Value-centered Exploration of Data Privacy and Personalized Privacy
                  Assistants},
  journal      = {Digit. Soc.},
  volume       = {1},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s44206-022-00028-w},
  doi          = {10.1007/S44206-022-00028-W},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/digitalsociety/Carter22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangZWWGTY22,
  author       = {Ning Wang and
                  Wei Zheng and
                  Zhigang Wang and
                  Zhiqiang Wei and
                  Yu Gu and
                  Peng Tang and
                  Ge Yu},
  title        = {Collecting and analyzing key-value data under shuffled differential
                  privacy},
  journal      = {Frontiers Comput. Sci.},
  volume       = {17},
  number       = {2},
  pages        = {172606},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-022-1572-0},
  doi          = {10.1007/S11704-022-1572-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangZWWGTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/VaiwsriRCS22,
  author       = {Sirintra Vaiwsri and
                  Thilina Ranbaduge and
                  Peter Christen and
                  Rainer Schnell},
  title        = {Accurate privacy-preserving record linkage for databases with missing
                  values},
  journal      = {Inf. Syst.},
  volume       = {106},
  pages        = {101959},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.is.2021.101959},
  doi          = {10.1016/J.IS.2021.101959},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/is/VaiwsriRCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jche/JonesVBHV22,
  author       = {Kyle M. L. Jones and
                  Amy VanScoy and
                  Kawanna Bright and
                  Alison Harding and
                  Sanika Vedak},
  title        = {A measurement of faculty views on the meaning and value of student
                  privacy},
  journal      = {J. Comput. High. Educ.},
  volume       = {34},
  number       = {3},
  pages        = {769--789},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12528-022-09320-7},
  doi          = {10.1007/S12528-022-09320-7},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jche/JonesVBHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mktsci/Lin22,
  author       = {Tesary Lin},
  title        = {Valuing Intrinsic and Instrumental Preferences for Privacy},
  journal      = {Mark. Sci.},
  volume       = {41},
  number       = {4},
  pages        = {235--253},
  year         = {2022},
  url          = {https://doi.org/10.1287/mksc.2022.1368},
  doi          = {10.1287/MKSC.2022.1368},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mktsci/Lin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ScottCM22,
  author       = {Mary Scott and
                  Graham Cormode and
                  Carsten Maple},
  title        = {Aggregation and Transformation of Vector-Valued Messages in the Shuffle
                  Model of Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {612--627},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3147643},
  doi          = {10.1109/TIFS.2022.3147643},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ScottCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangXCLL22,
  author       = {Jungang Yang and
                  Liyao Xiang and
                  Ruidong Chen and
                  Weiting Li and
                  Baochun Li},
  title        = {Differential Privacy for Tensor-Valued Queries},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {152--164},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2021.3089884},
  doi          = {10.1109/TIFS.2021.3089884},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangXCLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coopis/HenryHKLGB22,
  author       = {Tiphaine Henry and
                  Julien Hatin and
                  L{\'{e}}o Kazmierczak and
                  Nassim Laga and
                  Walid Gaaloul and
                  Emmanuel Bertin},
  editor       = {Mohamed Sellami and
                  Paolo Ceravolo and
                  Hajo A. Reijers and
                  Walid Gaaloul and
                  Herv{\'{e}} Panetto},
  title        = {Random-Value Payment Tokens for On-Chain Privacy-Preserving Payments},
  booktitle    = {Cooperative Information Systems - 28th International Conference, CoopIS
                  2022, Bozen-Bolzano, Italy, October 4-7, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13591},
  pages        = {223--241},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17834-4\_13},
  doi          = {10.1007/978-3-031-17834-4\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coopis/HenryHKLGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KurtzVS22,
  author       = {Christian Kurtz and
                  Pascal Vogel and
                  Martin Semmann},
  title        = {Exploring Archetypes of Value Co-Destructive Privacy Practices},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/79505},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/KurtzVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LiuAH22,
  author       = {Jian Liu and
                  Jianqiao An and
                  Yahong Han},
  title        = {Mining Valuable Source Domain Instances for Privacy-Preserving Domain
                  Adaptive Object Detection},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022,
                  Taipei, Taiwan, July 18-22, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICME52920.2022.9859911},
  doi          = {10.1109/ICME52920.2022.9859911},
  timestamp    = {Wed, 31 Aug 2022 09:04:57 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/LiuAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KamatsukaYM22,
  author       = {Akira Kamatsuka and
                  Takahiro Yoshida and
                  Toshiyasu Matsushima},
  title        = {A Generalization of the Stratonovich's Value of Information and Application
                  to Privacy-Utility Trade-off},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2022,
                  Espoo, Finland, June 26 - July 1, 2022},
  pages        = {1999--2004},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISIT50566.2022.9834667},
  doi          = {10.1109/ISIT50566.2022.9834667},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KamatsukaYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/MiaoQWTWWDD22,
  author       = {Ying Miao and
                  Lianyong Qi and
                  Haoyang Wu and
                  Yuxin Tian and
                  Shengqi Wu and
                  Yuqing Wang and
                  Fei Dai and
                  Shaoqi Ding},
  editor       = {Yuan Xu and
                  Hongyang Yan and
                  Huang Teng and
                  Jun Cai and
                  Jin Li},
  title        = {Distributed Power Load Missing Value Forecasting with Privacy Protection},
  booktitle    = {Machine Learning for Cyber Security - 4th International Conference,
                  {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13655},
  pages        = {521--534},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20096-0\_39},
  doi          = {10.1007/978-3-031-20096-0\_39},
  timestamp    = {Mon, 30 Jan 2023 08:02:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/MiaoQWTWWDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/DengZTGZL22,
  author       = {Bowen Deng and
                  Lele Zheng and
                  Ze Tong and
                  Jing Gao and
                  Tao Zhang and
                  Qi Li},
  title        = {{OKV:} Optimized Key-Value Data Collection with Local Differential
                  Privacy},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2022, Urumqi, China, December 3-5, 2022},
  pages        = {421--426},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NaNA56854.2022.00078},
  doi          = {10.1109/NANA56854.2022.00078},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nana/DengZTGZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/KhavkinT22,
  author       = {Michael Khavkin and
                  Eran Toch},
  editor       = {Felix Bieker and
                  Joachim Meyer and
                  Sebastian Pape and
                  Ina Schiering and
                  Andreas Weich},
  title        = {Valuation of Differential Privacy Budget in Data Trade: {A} Conjoint
                  Analysis},
  booktitle    = {Privacy and Identity Management - 17th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022,
                  Virtual Event, August 30 - September 2, 2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {671},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-31971-6\_7},
  doi          = {10.1007/978-3-031-31971-6\_7},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/KhavkinT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CampanelliEO22,
  author       = {Matteo Campanelli and
                  Felix Engelmann and
                  Claudio Orlandi},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Zero-Knowledge for Homomorphic Key-Value Commitments with Applications
                  to Privacy-Preserving Ledgers},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {761--784},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_33},
  doi          = {10.1007/978-3-031-14791-3\_33},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/CampanelliEO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuCJG22,
  author       = {Yongji Wu and
                  Xiaoyu Cao and
                  Jinyuan Jia and
                  Neil Zhenqiang Gong},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Poisoning Attacks to Local Differential Privacy Protocols for Key-Value
                  Data},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {519--536},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/wu-yongji},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuCJG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/whiceb/XieX22,
  author       = {Wenfang Xie and
                  Huosong Xia},
  title        = {How does Privacy Transfer Affect the Value Co-creation Behavior of
                  Gray Privacy Products? -Female Bras as an Example},
  booktitle    = {The 21st Wuhan International Conference on E-Business, {WHICEB} 2022,
                  Wuhan, China, 27-29 May 2022},
  pages        = {13},
  publisher    = {Association for Information Systems},
  year         = {2022},
  url          = {https://aisel.aisnet.org/whiceb2022/13},
  timestamp    = {Thu, 15 Jun 2023 15:22:47 +0200},
  biburl       = {https://dblp.org/rec/conf/whiceb/XieX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/BonuraCDDMMNNP22,
  author       = {Susanna Bonura and
                  Davide Dalle Carbonare and
                  Roberto D{\'{\i}}az{-}Morales and
                  Marcos Fern{\'{a}}ndez D{\'{\i}}az and
                  Lucrezia Morabito and
                  Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Chiara Napione and
                  {\'{A}}ngel Navia{-}V{\'{a}}zquez and
                  Mark Purcell},
  editor       = {Edward Curry and
                  S{\"{o}}ren Auer and
                  Arne J. Berre and
                  Andreas Metzger and
                  Mar{\'{\i}}a S. P{\'{e}}rez and
                  Sonja Zillner},
  title        = {Privacy-Preserving Technologies for Trusted Data Spaces},
  booktitle    = {Technologies and Applications for Big Data Value},
  pages        = {111--134},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-78307-5\_6},
  doi          = {10.1007/978-3-030-78307-5\_6},
  timestamp    = {Tue, 11 Apr 2023 12:52:02 +0200},
  biburl       = {https://dblp.org/rec/books/sp/22/BonuraCDDMMNNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11449,
  author       = {Akira Kamatsuka and
                  Takahiro Yoshida and
                  Toshiyasu Matsushima},
  title        = {A Generalization of the Stratonovich's Value of Information and Application
                  to Privacy-Utility Trade-off},
  journal      = {CoRR},
  volume       = {abs/2201.11449},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11449},
  eprinttype    = {arXiv},
  eprint       = {2201.11449},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11449.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-13266,
  author       = {Mary Scott and
                  Graham Cormode and
                  Carsten Maple},
  title        = {Aggregation and Transformation of Vector-Valued Messages in the Shuffle
                  Model of Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2201.13266},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.13266},
  eprinttype    = {arXiv},
  eprint       = {2201.13266},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-13266.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-05085,
  author       = {Gonzalo Munilla Garrido and
                  Kaja Schmidt and
                  Christopher Harth{-}Kitzerow and
                  Johannes Klepsch and
                  Andr{\'{e}} Luckow and
                  Florian Matthes},
  title        = {Exploring privacy-enhancing technologies in the automotive value chain},
  journal      = {CoRR},
  volume       = {abs/2209.05085},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.05085},
  doi          = {10.48550/ARXIV.2209.05085},
  eprinttype    = {arXiv},
  eprint       = {2209.05085},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-05085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-10786,
  author       = {Lulu Pan and
                  Haibin Shao and
                  Yang Lu and
                  Mehran Mesbahi and
                  Dewei Li and
                  Yugeng Xi},
  title        = {Vector-valued Privacy-Preserving Average Consensus},
  journal      = {CoRR},
  volume       = {abs/2209.10786},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.10786},
  doi          = {10.48550/ARXIV.2209.10786},
  eprinttype    = {arXiv},
  eprint       = {2209.10786},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-10786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-00528,
  author       = {Sarah E. Carter},
  title        = {A Value-Centered Exploration of Data Privacy and Personalized Privacy
                  Assistants},
  journal      = {CoRR},
  volume       = {abs/2212.00528},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.00528},
  doi          = {10.48550/ARXIV.2212.00528},
  eprinttype    = {arXiv},
  eprint       = {2212.00528},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-00528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuT22,
  author       = {Bowen Liu and
                  Qiang Tang},
  title        = {Privacy-preserving Federated Singular Value Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1271},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1271},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Marsh21,
  author       = {John Marsh},
  title        = {The Influence of an Individual's Disposition to Value Privacy in a
                  Non-Contrived Study},
  school       = {Nova Southeastern University, Fort Lauderdale, Florida, {USA}},
  year         = {2021},
  url          = {https://nsuworks.nova.edu/gscis\_etd/1137},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Marsh21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/DiJ21,
  author       = {Boya Di and
                  Nicholas R. Jennings},
  title        = {A contract-based incentive mechanism for distributed meeting scheduling:
                  Can agents who value privacy tell the truth?},
  journal      = {Auton. Agents Multi Agent Syst.},
  volume       = {35},
  number       = {2},
  pages        = {35},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10458-021-09516-8},
  doi          = {10.1007/S10458-021-09516-8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aamas/DiJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsj/LiLM21,
  author       = {Xiao{-}Bai Li and
                  Xiaoping Liu and
                  Luvai Motiwalla},
  title        = {Valuing Personal Data with Privacy Consideration},
  journal      = {Decis. Sci.},
  volume       = {52},
  number       = {2},
  pages        = {393--426},
  year         = {2021},
  url          = {https://doi.org/10.1111/deci.12442},
  doi          = {10.1111/DECI.12442},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsj/LiLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ZhangZX21,
  author       = {Yueyue Zhang and
                  Cheng Zhang and
                  Yunjie Xu},
  title        = {Effect of data privacy and security investment on the value of big
                  data firms},
  journal      = {Decis. Support Syst.},
  volume       = {146},
  pages        = {113543},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.dss.2021.113543},
  doi          = {10.1016/J.DSS.2021.113543},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/ZhangZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhangZQ21,
  author       = {Zhishuo Zhang and
                  Wei Zhang and
                  Zhiguang Qin},
  title        = {A partially hidden policy {CP-ABE} scheme against attribute values
                  guessing attacks with online privacy-protective decryption testing
                  in IoT assisted cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {123},
  pages        = {181--195},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.04.022},
  doi          = {10.1016/J.FUTURE.2021.04.022},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhangZQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/ShahNLBA21,
  author       = {Syed Hamad Hassan Shah and
                  Saleha Noor and
                  Shen Lei and
                  Atif Saleem Butt and
                  Muhammad Ali},
  title        = {Role of privacy/safety risk and trust on the development of prosumption
                  and value co-creation under the sharing economy: a moderated mediation
                  model},
  journal      = {Inf. Technol. Dev.},
  volume       = {27},
  number       = {4},
  pages        = {718--735},
  year         = {2021},
  url          = {https://doi.org/10.1080/02681102.2021.1877604},
  doi          = {10.1080/02681102.2021.1877604},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/ShahNLBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/BenamatiOS21,
  author       = {John H. Benamati and
                  Zafer D. Ozdemir and
                  H. Jeff Smith},
  title        = {Information Privacy, Cultural Values, and Regulatory Preferences},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {29},
  number       = {3},
  pages        = {131--164},
  year         = {2021},
  url          = {https://doi.org/10.4018/jgim.2021050106},
  doi          = {10.4018/JGIM.2021050106},
  timestamp    = {Mon, 05 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/BenamatiOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LinCLW21,
  author       = {Wanyu Lin and
                  Helei Cui and
                  Baochun Li and
                  Cong Wang},
  title        = {Privacy-Preserving Similarity Search With Efficient Updates in Distributed
                  Key-Value Stores},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {32},
  number       = {5},
  pages        = {1072--1084},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPDS.2020.3042695},
  doi          = {10.1109/TPDS.2020.3042695},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/LinCLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/HanCM21,
  author       = {Mu Han and
                  Pengzhou Cheng and
                  Shidian Ma},
  title        = {PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection
                  system based complex-valued neural network},
  journal      = {Veh. Commun.},
  volume       = {31},
  pages        = {100374},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2021.100374},
  doi          = {10.1016/J.VEHCOM.2021.100374},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/HanCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhengYDTT21,
  author       = {Xu Zheng and
                  Ke Yan and
                  Jingyuan Duan and
                  Wenyi Tang and
                  Ling Tian},
  title        = {Histogram Publication over Numerical Values under Local Differential
                  Privacy},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {8886255:1--8886255:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8886255},
  doi          = {10.1155/2021/8886255},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhengYDTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/KoskelaJPH21,
  author       = {Antti Koskela and
                  Joonas J{\"{a}}lk{\"{o}} and
                  Lukas Prediger and
                  Antti Honkela},
  editor       = {Arindam Banerjee and
                  Kenji Fukumizu},
  title        = {Tight Differential Privacy for Discrete-Valued Mechanisms and for
                  the Subsampled Gaussian Mechanism Using {FFT}},
  booktitle    = {The 24th International Conference on Artificial Intelligence and Statistics,
                  {AISTATS} 2021, April 13-15, 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {130},
  pages        = {3358--3366},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v130/koskela21a.html},
  timestamp    = {Wed, 14 Apr 2021 16:51:37 +0200},
  biburl       = {https://dblp.org/rec/conf/aistats/KoskelaJPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MoscaS21,
  author       = {Francesca Mosca and
                  Jose M. Such},
  editor       = {Frank Dignum and
                  Alessio Lomuscio and
                  Ulle Endriss and
                  Ann Now{\'{e}}},
  title        = {{ELVIRA:} An Explainable Agent for Value and Utility-Driven Multiuser
                  Privacy},
  booktitle    = {{AAMAS} '21: 20th International Conference on Autonomous Agents and
                  Multiagent Systems, Virtual Event, United Kingdom, May 3-7, 2021},
  pages        = {916--924},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://www.ifaamas.org/Proceedings/aamas2021/pdfs/p916.pdf},
  doi          = {10.5555/3463952.3464061},
  timestamp    = {Wed, 20 Jul 2022 17:03:47 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/MoscaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/GarridoSHKLM21,
  author       = {Gonzalo Munilla Garrido and
                  Kaja Schmidt and
                  Christopher Harth{-}Kitzerow and
                  Johannes Klepsch and
                  Andr{\'{e}} Luckow and
                  Florian Matthes},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {Exploring privacy-enhancing technologies in the automotive value chain},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {1265--1272},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671528},
  doi          = {10.1109/BIGDATA52589.2021.9671528},
  timestamp    = {Fri, 13 Jan 2023 17:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/GarridoSHKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/case/GiehlHB21,
  author       = {Alexander Giehl and
                  Michael P. Heinl and
                  Maximilian Busch},
  title        = {Leveraging Edge Computing and Differential Privacy to Securely Enable
                  Industrial Cloud Collaboration Along the Value Chain},
  booktitle    = {17th {IEEE} International Conference on Automation Science and Engineering,
                  {CASE} 2021, Lyon, France, August 23-27, 2021},
  pages        = {2023--2028},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CASE49439.2021.9551656},
  doi          = {10.1109/CASE49439.2021.9551656},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/case/GiehlHB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LiuLCGLF21,
  author       = {Tong Liu and
                  Dan Li and
                  Chenhong Cao and
                  Honghao Gao and
                  Chengfan Li and
                  Zhenni Feng},
  editor       = {Honghao Gao and
                  Xinheng Wang},
  title        = {Joint Location-Value Privacy Protection for Spatiotemporal Data Collection
                  via Mobile Crowdsensing},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 17th {EAI} International Conference, CollaborateCom 2021, Virtual
                  Event, October 16-18, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {407},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92638-0\_6},
  doi          = {10.1007/978-3-030-92638-0\_6},
  timestamp    = {Wed, 02 Nov 2022 13:39:49 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/LiuLCGLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/Tauro21,
  author       = {Carolyn Kavita Tauro},
  title        = {Values of privacy and trust for monitoring health in injecting drug
                  users},
  booktitle    = {25th International Enterprise Distributed Object Computing Workshop,
                  {EDOC} Workshop 2021, Gold Coast, Australia, October 25-29, 2021},
  pages        = {95--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EDOCW52865.2021.00038},
  doi          = {10.1109/EDOCW52865.2021.00038},
  timestamp    = {Fri, 03 Dec 2021 09:13:31 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/Tauro21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/JonesVBH21,
  author       = {Kyle M. L. Jones and
                  Amy VanScoy and
                  Kawanna Bright and
                  Alison Harding},
  title        = {Do They Even Care? Measuring Instructor Value of Student Privacy in
                  the Context of Learning Analytics},
  booktitle    = {54th Hawaii International Conference on System Sciences, {HICSS} 2021,
                  Kauai, Hawaii, USA, January 5, 2021},
  pages        = {1--9},
  publisher    = {ScholarSpace},
  year         = {2021},
  url          = {https://hdl.handle.net/10125/70797},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/JonesVBH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/Carter21,
  author       = {Sarah E. Carter},
  editor       = {Denis Dennehy and
                  Anastasia Griva and
                  Nancy Pouloudi and
                  Yogesh K. Dwivedi and
                  Ilias O. Pappas and
                  Matti M{\"{a}}ntym{\"{a}}ki},
  title        = {Is Downloading This App Consistent with My Values? - Conceptualizing
                  a Value-Centered Privacy Assistant},
  booktitle    = {Responsible {AI} and Analytics for an Ethical and Inclusive Digitized
                  Society - 20th {IFIP} {WG} 6.11 Conference on e-Business, e-Services
                  and e-Society, {I3E} 2021, Galway, Ireland, September 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12896},
  pages        = {285--291},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85447-8\_25},
  doi          = {10.1007/978-3-030-85447-8\_25},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/Carter21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/00010L0ZY21,
  author       = {Qingqing Ye and
                  Haibo Hu and
                  Ninghui Li and
                  Xiaofeng Meng and
                  Huadi Zheng and
                  Haotian Yan},
  title        = {Beyond Value Perturbation: Local Differential Privacy in the Temporal
                  Setting},
  booktitle    = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021,
                  Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOM42981.2021.9488899},
  doi          = {10.1109/INFOCOM42981.2021.9488899},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/00010L0ZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/MimoM21,
  author       = {Edgard Musafiri Mimo and
                  Troy McDaniel},
  title        = {3D Privacy Framework: The Citizen Value Driven Privacy Framework},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2021, Manchester,
                  United Kingdom, September 7-10, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISC253183.2021.9562841},
  doi          = {10.1109/ISC253183.2021.9562841},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/MimoM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/KamatsukaYM21,
  author       = {Akira Kamatsuka and
                  Takahiro Yoshida and
                  Toshiyasu Matsushima},
  title        = {Privacy-Utility Trade-off with the Stratonovich's Value of Information},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2021, Kanazawa, Japan, October
                  17-21, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ITW48936.2021.9611484},
  doi          = {10.1109/ITW48936.2021.9611484},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/KamatsukaYM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsdm/BagadMDSGK21,
  author       = {Piyush Bagad and
                  Subrata Mitra and
                  Sunny Dhamnani and
                  Atanu R. Sinha and
                  Raunak Gautam and
                  Haresh Khanna},
  editor       = {Liane Lewin{-}Eytan and
                  David Carmel and
                  Elad Yom{-}Tov and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Data-Sharing Economy: Value-Addition from Data meets Privacy},
  booktitle    = {{WSDM} '21, The Fourteenth {ACM} International Conference on Web Search
                  and Data Mining, Virtual Event, Israel, March 8-12, 2021},
  pages        = {1105--1108},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437963.3441712},
  doi          = {10.1145/3437963.3441712},
  timestamp    = {Wed, 07 Apr 2021 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/wsdm/BagadMDSGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-12458,
  author       = {Sarah E. Carter},
  title        = {Is Downloading this App Consistent with my Values? Conceptualizing
                  a Value-Centered Privacy Assistant},
  journal      = {CoRR},
  volume       = {abs/2106.12458},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.12458},
  eprinttype    = {arXiv},
  eprint       = {2106.12458},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-12458.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02780,
  author       = {Anish Agarwal and
                  Rahul Singh},
  title        = {Causal Inference with Corrupted Data: Measurement Error, Missing Values,
                  Discretization, and Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2107.02780},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02780},
  eprinttype    = {arXiv},
  eprint       = {2107.02780},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-03478,
  author       = {Alexander Ziller and
                  Dmitrii Usynin and
                  Moritz Knolle and
                  Kerstin Hammernik and
                  Daniel Rueckert and
                  Georgios Kaissis},
  title        = {Complex-valued deep learning with differential privacy},
  journal      = {CoRR},
  volume       = {abs/2110.03478},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.03478},
  eprinttype    = {arXiv},
  eprint       = {2110.03478},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-03478.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11534,
  author       = {Yongji Wu and
                  Xiaoyu Cao and
                  Jinyuan Jia and
                  Neil Zhenqiang Gong},
  title        = {Poisoning Attacks to Local Differential Privacy Protocols for Key-Value
                  Data},
  journal      = {CoRR},
  volume       = {abs/2111.11534},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11534},
  eprinttype    = {arXiv},
  eprint       = {2111.11534},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11534.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CampanelliEO21,
  author       = {Matteo Campanelli and
                  Felix Engelmann and
                  Claudio Orlandi},
  title        = {Zero-Knowledge for Homomorphic Key-Value Commitments with Applications
                  to Privacy-Preserving Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1678},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1678},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CampanelliEO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KousikP21,
  title        = {An improved privacy-preserving data mining technique using singular
                  value decomposition with three-dimensional rotation data perturbation},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {9},
  pages        = {10003--10011},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s11227-021-03643-5},
  doi          = {10.1007/S11227-021-03643-5},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/KousikP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Awad20,
  author       = {Nancy Awad},
  title        = {Publishing set-valued dataset : strengthening the Disassociation approach
                  to improve both privacy preservation and utility. (Publication d'un
                  ensemble de donn{\'{e}}es ensemblistes : renforcer le sch{\'{e}}ma
                  de dissociation pour am{\'{e}}liorer {\`{a}} la fois la protection
                  de la vie priv{\'{e}}e et l'utilit{\'{e}})},
  school       = {University of Bourgogne-Franche-Comt{\'{e}}, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-03234126},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Awad20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OishiSTO20,
  author       = {Keiichiro Oishi and
                  Yuichi Sei and
                  Yasuyuki Tahara and
                  Akihiko Ohsuga},
  title        = {Semantic diversity: Privacy considering distance between values of
                  sensitive attribute},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101823},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101823},
  doi          = {10.1016/J.COSE.2020.101823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OishiSTO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/Rowe20,
  author       = {Frantz Rowe},
  title        = {Contact tracing apps and values dilemmas: {A} privacy paradox in a
                  neo-liberal world},
  journal      = {Int. J. Inf. Manag.},
  volume       = {55},
  pages        = {102178},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2020.102178},
  doi          = {10.1016/J.IJINFOMGT.2020.102178},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/Rowe20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/OhPLCN20,
  author       = {Hyeontaek Oh and
                  Sangdon Park and
                  Gyu Myoung Lee and
                  Jun Kyun Choi and
                  Sungkee Noh},
  title        = {Competitive Data Trading Model With Privacy Valuation for Multiple
                  Stakeholders in IoT Data Markets},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {3623--3639},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2973662},
  doi          = {10.1109/JIOT.2020.2973662},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/OhPLCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isem/Bordonaba-Juste20,
  author       = {Victoria Bordonaba{-}Juste and
                  Laura Lucia{-}Palacios and
                  Ra{\'{u}}l P{\'{e}}rez{-}L{\'{o}}pez},
  title        = {Generational differences in valuing usefulness, privacy and security
                  negative experiences for paying for cloud services},
  journal      = {Inf. Syst. {E} Bus. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {35--60},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10257-020-00462-8},
  doi          = {10.1007/S10257-020-00462-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isem/Bordonaba-Juste20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/HuangZC20,
  author       = {Yue Huang and
                  Peng Zeng and
                  Kim{-}Kwang Raymond Choo},
  title        = {An Efficient Privacy-Preserving Protocol for Computing kth Minimum
                  Value in {P2P} Networks},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {29},
  number       = {9},
  pages        = {2050138:1--2050138:20},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218126620501388},
  doi          = {10.1142/S0218126620501388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/HuangZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/WangQDYHX20,
  author       = {Shaowei Wang and
                  Yuqiu Qian and
                  Jiachun Du and
                  Wei Yang and
                  Liusheng Huang and
                  Hongli Xu},
  title        = {Set-valued Data Publication with Local Privacy: Tight Error Bounds
                  and Efficient Mechanisms},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {13},
  number       = {8},
  pages        = {1234--1247},
  year         = {2020},
  url          = {http://www.vldb.org/pvldb/vol13/p1234-wang.pdf},
  doi          = {10.14778/3389133.3389140},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pvldb/WangQDYHX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/RiyanaNR20,
  author       = {Surapon Riyana and
                  Srikul Nanthachumphu and
                  Noppamas Riyana},
  title        = {Achieving Privacy Preservation Constraints in Missing-Value Datasets},
  journal      = {{SN} Comput. Sci.},
  volume       = {1},
  number       = {4},
  pages        = {227},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42979-020-00241-9},
  doi          = {10.1007/S42979-020-00241-9},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/RiyanaNR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetci/ChaWTJTY20,
  author       = {Shih{-}Chao Cha and
                  Hao Wang and
                  Zhiyuan Tan and
                  Yuh{-}Jzer Joung and
                  Yen{-}Chung Tseng and
                  Kuo{-}Hui Yeh},
  title        = {On Privacy Aware Carriers for Value-Possessed e-Invoices Considering
                  Intelligence Mining},
  journal      = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
  volume       = {4},
  number       = {5},
  pages        = {641--652},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETCI.2019.2938547},
  doi          = {10.1109/TETCI.2019.2938547},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetci/ChaWTJTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongLWL20,
  author       = {Haina Song and
                  Tao Luo and
                  Xun Wang and
                  Jianfeng Li},
  title        = {Multiple Sensitive Values-Oriented Personalized Privacy Preservation
                  Based on Randomized Response},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2209--2224},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2959911},
  doi          = {10.1109/TIFS.2019.2959911},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SongLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/GoelHDW20,
  author       = {Sanjay Goel and
                  Jingyi Huang and
                  Alan R. Dennis and
                  Kevin J. Williams},
  editor       = {Bonnie Brinton Anderson and
                  Jason Thatcher and
                  Rayman D. Meservy and
                  Kathy Chudoba and
                  Kelly J. Fadel and
                  Sue Brown},
  title        = {Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap
                  between Privacy Valuation and Behavior},
  booktitle    = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual
                  Conference, August 15-17, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/amcis2020/info\_security\_privacy/info\_security\_privacy/28},
  timestamp    = {Mon, 27 Jul 2020 19:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/GoelHDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/Mosca20,
  author       = {Francesca Mosca},
  editor       = {Amal El Fallah Seghrouchni and
                  Gita Sukthankar and
                  Bo An and
                  Neil Yorke{-}Smith},
  title        = {Value-Aligned and Explainable Agents for Collective Decision Making:
                  Privacy Application},
  booktitle    = {Proceedings of the 19th International Conference on Autonomous Agents
                  and Multiagent Systems, {AAMAS} '20, Auckland, New Zealand, May 9-13,
                  2020},
  pages        = {2199--2200},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems},
  year         = {2020},
  url          = {https://dl.acm.org/doi/10.5555/3398761.3399124},
  doi          = {10.5555/3398761.3399124},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/Mosca20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MoscaSM20,
  author       = {Francesca Mosca and
                  Jose M. Such and
                  Peter McBurney},
  editor       = {Amal El Fallah Seghrouchni and
                  Gita Sukthankar and
                  Bo An and
                  Neil Yorke{-}Smith},
  title        = {Towards a Value-driven Explainable Agent for Collective Privacy},
  booktitle    = {Proceedings of the 19th International Conference on Autonomous Agents
                  and Multiagent Systems, {AAMAS} '20, Auckland, New Zealand, May 9-13,
                  2020},
  pages        = {1937--1939},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems},
  year         = {2020},
  url          = {https://dl.acm.org/doi/10.5555/3398761.3399033},
  doi          = {10.5555/3398761.3399033},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/MoscaSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/WangMTS20,
  author       = {Lei Wang and
                  Ian R. Manchester and
                  Jochen Trumpf and
                  Guodong Shi},
  title        = {Initial-Value Privacy of Linear Dynamical Systems},
  booktitle    = {59th {IEEE} Conference on Decision and Control, {CDC} 2020, Jeju Island,
                  South Korea, December 14-18, 2020},
  pages        = {3108--3113},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CDC42340.2020.9303900},
  doi          = {10.1109/CDC42340.2020.9303900},
  timestamp    = {Fri, 04 Mar 2022 13:31:02 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/WangMTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangLBCLL20,
  author       = {Li{-}e Wang and
                  Shan Lin and
                  Yan Bai and
                  Sang{-}Yoon Chang and
                  Xianxian Li and
                  Peng Liu},
  title        = {A Privacy Preserving Method for Publishing Set-valued Data and Its
                  Correlative Social Network},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149167},
  doi          = {10.1109/ICC40277.2020.9149167},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangLBCLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebt/Nabbosa20,
  author       = {Veronica L. Nabbosa},
  editor       = {Lili Yang},
  title        = {Me Too: Value Creation by Digitalization and Data Privacy},
  booktitle    = {{ICEBT} 2020, The 4th International Conference on E-Education, E-Business
                  and E-Technology, Shanghai China, June 5-7, 2020},
  pages        = {20--24},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3404649.3404650},
  doi          = {10.1145/3404649.3404650},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icebt/Nabbosa20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/XiangZMZRZ20,
  author       = {Liyao Xiang and
                  Hao Zhang and
                  Haotian Ma and
                  Yifan Zhang and
                  Jie Ren and
                  Quanshi Zhang},
  title        = {Interpretable Complex-Valued Neural Networks for Privacy Protection},
  booktitle    = {8th International Conference on Learning Representations, {ICLR} 2020,
                  Addis Ababa, Ethiopia, April 26-30, 2020},
  publisher    = {OpenReview.net},
  year         = {2020},
  url          = {https://openreview.net/forum?id=S1xFl64tDr},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/XiangZMZRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/BruschiRPS20,
  author       = {Francesco Bruschi and
                  Vincenzo Rana and
                  Alessio Pagani and
                  Donatella Sciuto},
  editor       = {Franco Chiaraluce and
                  Leonardo Mostarda},
  title        = {Acknowledging Value of Personal Information: a Privacy Aware Data
                  Market for Health and Social Research},
  booktitle    = {Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located
                  with {ITASEC} 2020, Ancona, Italy, February 4, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2580},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2580/DLT\_2020\_paper\_6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/BruschiRPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WuFSK20,
  author       = {Nan Wu and
                  Farhad Farokhi and
                  David B. Smith and
                  Mohamed Ali K{\^{a}}afar},
  title        = {The Value of Collaboration in Convex Machine Learning with Differential
                  Privacy},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {304--317},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00025},
  doi          = {10.1109/SP40000.2020.00025},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WuFSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmbo/SohailKSB20,
  author       = {Syeda Sohail and
                  Johannes Krabbe and
                  Patr{\'{\i}}cio de Alencar Silva and
                  Faiza Allah Bukhsh},
  editor       = {Ben Roelens and
                  Wim Laurier and
                  Geert Poels and
                  Hans Weigand},
  title        = {Privacy Value Modeling: {A} Gateway to Ethical Big Data Handling (full
                  paper)},
  booktitle    = {Proceedings of 14th International Workshop on Value Modelling and
                  Business Ontologies, Brussels, Belgium, January 16-17, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2574},
  pages        = {5--15},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2574/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:57 +0100},
  biburl       = {https://dblp.org/rec/conf/vmbo/SohailKSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GefenBTY20,
  author       = {Gilie Gefen and
                  Omer Ben{-}Porat and
                  Moshe Tennenholtz and
                  Elad Yom{-}Tov},
  editor       = {Amal El Fallah Seghrouchni and
                  Gita Sukthankar and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Privacy, Altruism, and Experience: Estimating the Perceived Value
                  of Internet Data for Medical Uses},
  booktitle    = {Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24,
                  2020},
  pages        = {552--556},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366424.3383414},
  doi          = {10.1145/3366424.3383414},
  timestamp    = {Thu, 13 Aug 2020 18:46:26 +0200},
  biburl       = {https://dblp.org/rec/conf/www/GefenBTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-05892,
  author       = {Geoffrey Goodell},
  title        = {Privacy by Design in Value-Exchange Systems},
  journal      = {CoRR},
  volume       = {abs/2006.05892},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.05892},
  eprinttype    = {arXiv},
  eprint       = {2006.05892},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-05892.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07134,
  author       = {Antti Koskela and
                  Joonas J{\"{a}}lk{\"{o}} and
                  Lukas Prediger and
                  Antti Honkela},
  title        = {Tight Approximate Differential Privacy for Discrete-Valued Mechanisms
                  Using {FFT}},
  journal      = {CoRR},
  volume       = {abs/2006.07134},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07134},
  eprinttype    = {arXiv},
  eprint       = {2006.07134},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07134.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-10193,
  author       = {Lei Wang and
                  Ian R. Manchester and
                  Jochen Trumpf and
                  Guodong Shi},
  title        = {Initial-Value Privacy of Linear Dynamical Systems},
  journal      = {CoRR},
  volume       = {abs/2008.10193},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.10193},
  eprinttype    = {arXiv},
  eprint       = {2008.10193},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-10193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/BaumannHGL19,
  author       = {Annika Baumann and
                  Johannes Haupt and
                  Fabian Gebert and
                  Stefan Lessmann},
  title        = {The Price of Privacy - An Evaluation of the Economic Value of Collecting
                  Clickstream Data},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {61},
  number       = {4},
  pages        = {413--431},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12599-018-0528-2},
  doi          = {10.1007/S12599-018-0528-2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/BaumannHGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/PalC19,
  author       = {Ranjan Pal and
                  Jon Crowcroft},
  title        = {Privacy trading in the surveillance capitalism age \emph{viewpoints
                  on 'privacy-preserving' societal value creation}},
  journal      = {Comput. Commun. Rev.},
  volume       = {49},
  number       = {3},
  pages        = {26--31},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371927.3371931},
  doi          = {10.1145/3371927.3371931},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/PalC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/Kim19,
  author       = {Sungwook Kim},
  title        = {A new differential privacy preserving crowdsensing scheme based on
                  the Owen value},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2019},
  pages        = {159},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13638-019-1468-3},
  doi          = {10.1186/S13638-019-1468-3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/Kim19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/Kim19a,
  author       = {Sungwook Kim},
  title        = {A new differential privacy preserving crowdsensing scheme based on
                  the Owen value},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2019},
  pages        = {158},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13638-019-1479-0},
  doi          = {10.1186/S13638-019-1479-0},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/Kim19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijssmet/Feltus19,
  author       = {Christophe Feltus},
  title        = {Deriving Information System Security and Privacy From Value Cocreation
                  Theory: Case Study in the Financial Sector},
  journal      = {Int. J. Serv. Sci. Manag. Eng. Technol.},
  volume       = {10},
  number       = {4},
  pages        = {1--25},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJSSMET.2019100101},
  doi          = {10.4018/IJSSMET.2019100101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijssmet/Feltus19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CossD19,
  author       = {David Lewis Coss and
                  Gurpreet Dhillon},
  title        = {Cloud privacy objectives a value based approach},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {189--220},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-05-2017-0034},
  doi          = {10.1108/ICS-05-2017-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CossD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/DegelingULHSH19,
  author       = {Martin Degeling and
                  Christine Utz and
                  Christopher Lentzsch and
                  Henry Hosseini and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's
                  Impact on Web Privacy},
  journal      = {Inform. Spektrum},
  volume       = {42},
  number       = {5},
  pages        = {345--346},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00287-019-01201-1},
  doi          = {10.1007/S00287-019-01201-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/DegelingULHSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/BuckmanBH19,
  author       = {Joseph R. Buckman and
                  Jesse C. Bockstedt and
                  Matthew J. Hashim},
  title        = {Relative Privacy Valuations Under Varying Disclosure Characteristics},
  journal      = {Inf. Syst. Res.},
  volume       = {30},
  number       = {2},
  pages        = {375--388},
  year         = {2019},
  url          = {https://doi.org/10.1287/isre.2018.0818},
  doi          = {10.1287/ISRE.2018.0818},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isr/BuckmanBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/MontesSV19,
  author       = {Rodrigo Montes and
                  Wilfried Sand{-}Zantman and
                  Tommaso M. Valletti},
  title        = {The Value of Personal Information in Online Markets with Endogenous
                  Privacy},
  journal      = {Manag. Sci.},
  volume       = {65},
  number       = {3},
  pages        = {1342--1362},
  year         = {2019},
  url          = {https://doi.org/10.1287/mnsc.2017.2989},
  doi          = {10.1287/MNSC.2017.2989},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/MontesSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/EmaOSKOHAKKKI19,
  author       = {Arisa Ema and
                  Hirotaka Osawa and
                  Reina Saijo and
                  Akinori Kubo and
                  Takushi Otani and
                  Hiromitsu Hattori and
                  Naonori Akiya and
                  Nobutsugu Kanzaki and
                  Minao Kukita and
                  Kazunori Komatani and
                  Ryutaro Ichise},
  title        = {Clarifying Privacy, Property, and Power: Case Study on Value Conflict
                  Between Communities},
  journal      = {Proc. {IEEE}},
  volume       = {107},
  number       = {3},
  pages        = {575--581},
  year         = {2019},
  url          = {https://doi.org/10.1109/JPROC.2018.2837045},
  doi          = {10.1109/JPROC.2018.2837045},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/EmaOSKOHAKKKI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GaoZ19,
  author       = {Yunpeng Gao and
                  Nan Zhang},
  title        = {Social Security and Privacy for Social IoT Polymorphic Value Set:
                  {A} Solution to Inference Attacks on Social Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5498375:1--5498375:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5498375},
  doi          = {10.1155/2019/5498375},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GaoZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuT19,
  author       = {Bowen Liu and
                  Qiang Tang},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {Privacy-Preserving Decentralised Singular Value Decomposition},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {703--721},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_41},
  doi          = {10.1007/978-3-030-41579-2\_41},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiuT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DegelingULHSH19,
  author       = {Martin Degeling and
                  Christine Utz and
                  Christopher Lentzsch and
                  Henry Hosseini and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's
                  Impact on Web Privacy},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/we-value-your-privacy-now-take-some-cookies-measuring-the-gdprs-impact-on-web-privacy/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DegelingULHSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YeHMZ19,
  author       = {Qingqing Ye and
                  Haibo Hu and
                  Xiaofeng Meng and
                  Huadi Zheng},
  title        = {PrivKV: Key-Value Data Collection with Local Differential Privacy},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {317--331},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00018},
  doi          = {10.1109/SP.2019.00018},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YeHMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-09546,
  author       = {Liyao Xiang and
                  Haotian Ma and
                  Hao Zhang and
                  Yifan Zhang and
                  Quanshi Zhang},
  title        = {Complex-Valued Neural Networks for Privacy Protection},
  journal      = {CoRR},
  volume       = {abs/1901.09546},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.09546},
  eprinttype    = {arXiv},
  eprint       = {1901.09546},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-09546.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-08562,
  author       = {Gilie Gefen and
                  Omer Ben{-}Porat and
                  Moshe Tennenholtz and
                  Elad Yom{-}Tov},
  title        = {Privacy, altruism, and experience: Estimating the perceived value
                  of Internet data for medical uses},
  journal      = {CoRR},
  volume       = {abs/1906.08562},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.08562},
  eprinttype    = {arXiv},
  eprint       = {1906.08562},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-08562.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09679,
  author       = {Nan Wu and
                  Farhad Farokhi and
                  David B. Smith and
                  Mohamed Ali K{\^{a}}afar},
  title        = {The Value of Collaboration in Convex Machine Learning with Differential
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/1906.09679},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09679},
  eprinttype    = {arXiv},
  eprint       = {1906.09679},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09679.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-05014,
  author       = {Lin Sun and
                  Jun Zhao and
                  Xiaojun Ye and
                  Shuo Feng and
                  Teng Wang and
                  Tao Bai},
  title        = {Conditional Analysis for Key-Value Data with Local Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/1907.05014},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.05014},
  eprinttype    = {arXiv},
  eprint       = {1907.05014},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-05014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10331,
  author       = {Michalis Pachilakis and
                  Panagiotis Papadopoulos and
                  Nikolaos Laoutaris and
                  Evangelos P. Markatos and
                  Nicolas Kourtellis},
  title        = {Measuring ad value without bankrupting user privacy},
  journal      = {CoRR},
  volume       = {abs/1907.10331},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10331},
  eprinttype    = {arXiv},
  eprint       = {1907.10331},
  timestamp    = {Thu, 01 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuT19,
  author       = {Bowen Liu and
                  Qiang Tang},
  title        = {Privacy-Preserving Decentralised Singular Value Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1346},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1346},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XingMGC18,
  author       = {Ling Xing and
                  Qiang Ma and
                  Jianping Gao and
                  Song Chen},
  title        = {An Optimized Algorithm for Protecting Privacy Based on Coordinates
                  Mean Value for Cognitive Radio Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {21971--21979},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2822839},
  doi          = {10.1109/ACCESS.2018.2822839},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XingMGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YucelB18,
  author       = {Fatih Yucel and
                  Eyuphan Bulut},
  title        = {Clustered Crowd {GPS} for Privacy Valuing Active Localization},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {23213--23221},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2830300},
  doi          = {10.1109/ACCESS.2018.2830300},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YucelB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/DhillonOS18,
  author       = {Gurpreet Dhillon and
                  Tiago Oliveira and
                  Romilla Syed},
  title        = {Value-based information privacy objectives for Internet Commerce},
  journal      = {Comput. Hum. Behav.},
  volume       = {87},
  pages        = {292--307},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.chb.2018.05.043},
  doi          = {10.1016/J.CHB.2018.05.043},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/DhillonOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MalgieriC18,
  author       = {Gianclaudio Malgieri and
                  Bart Custers},
  title        = {Pricing privacy - the right to know the value of your personal data},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {34},
  number       = {2},
  pages        = {289--303},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.clsr.2017.08.006},
  doi          = {10.1016/J.CLSR.2017.08.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MalgieriC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/WottrichRS18,
  author       = {Verena M. Wottrich and
                  Eva A. van Reijmersdal and
                  Edith G. Smit},
  title        = {The privacy trade-off for mobile app downloads: The roles of app value,
                  intrusiveness, and privacy concerns},
  journal      = {Decis. Support Syst.},
  volume       = {106},
  pages        = {44--52},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.dss.2017.12.003},
  doi          = {10.1016/J.DSS.2017.12.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/WottrichRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiuLD18,
  author       = {Mengjun Liu and
                  Shubo Liu and
                  Yonggang Ding},
  title        = {{\unicode{22522}}{\unicode{20110}}0-1{\unicode{32534}}{\unicode{30721}}{\unicode{30340}}{\unicode{21442}}{\unicode{19982}}{\unicode{24335}}{\unicode{24863}}{\unicode{30693}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}}{\unicode{30340}}{\unicode{25968}}{\unicode{25454}}{\unicode{20215}}{\unicode{20540}}{\unicode{21305}}{\unicode{37197}}{\unicode{26041}}{\unicode{26696}}
                  {(0-1} Code Based Privacy-preserving Data Value Matching in Participatory
                  Sensing)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {3},
  pages        = {131--137},
  year         = {2018},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2018.03.021},
  doi          = {10.11896/J.ISSN.1002-137X.2018.03.021},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiuLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/midm/MeinertABKWP18,
  author       = {Edward Meinert and
                  Abrar Alturkistani and
                  David Brindley and
                  Peter Knight and
                  Glenn Wells and
                  Nick de Pennington},
  title        = {Weighing benefits and risks in aspects of security, privacy and adoption
                  of technology in a value-based healthcare system},
  journal      = {{BMC} Medical Informatics Decis. Mak.},
  volume       = {18},
  number       = {1},
  pages        = {100:1--100:4},
  year         = {2018},
  url          = {https://doi.org/10.1186/s12911-018-0700-0},
  doi          = {10.1186/S12911-018-0700-0},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/midm/MeinertABKWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/Ashouri-Talouki18,
  author       = {Maede Ashouri{-}Talouki},
  title        = {An efficient privacy-preserving {P2P} protocol for computing maximum
                  value in the presence of active adversaries},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {1},
  pages        = {34--43},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0490-z},
  doi          = {10.1007/S12083-016-0490-Z},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/Ashouri-Talouki18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhangZYD18,
  author       = {Hongli Zhang and
                  Zhigang Zhou and
                  Lin Ye and
                  Xiaojiang Du},
  title        = {Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid
                  Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {2},
  pages        = {316--329},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2430316},
  doi          = {10.1109/TCC.2015.2430316},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhangZYD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/teco/WangYZ18,
  author       = {Weina Wang and
                  Lei Ying and
                  Junshan Zhang},
  title        = {The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms,
                  and Fundamental Limits},
  journal      = {{ACM} Trans. Economics and Comput.},
  volume       = {6},
  number       = {2},
  pages        = {8:1--8:26},
  year         = {2018},
  url          = {https://doi.org/10.1145/3232863},
  doi          = {10.1145/3232863},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/teco/WangYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiX18,
  author       = {Guang Li and
                  Rui Xue},
  title        = {A New Privacy-Preserving Data Mining Method Using Non-negative Matrix
                  Factorization and Singular Value Decomposition},
  journal      = {Wirel. Pers. Commun.},
  volume       = {102},
  number       = {2},
  pages        = {1799--1808},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11277-017-5237-5},
  doi          = {10.1007/S11277-017-5237-5},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausdm/VaiwsriRC18,
  author       = {Sirintra Vaiwsri and
                  Thilina Ranbaduge and
                  Peter Christen},
  editor       = {Md. Rafiqul Islam and
                  Yun Sing Koh and
                  Yanchang Zhao and
                  Warwick Graco and
                  David Stirling and
                  Chang{-}Tsun Li and
                  Md Zahidul Islam},
  title        = {Reference Values Based Hardening for Bloom Filters Based Privacy-Preserving
                  Record Linkage},
  booktitle    = {Data Mining - 16th Australasian Conference, AusDM 2018, Bahrurst,
                  NSW, Australia, November 28-30, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {996},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-6661-1\_15},
  doi          = {10.1007/978-981-13-6661-1\_15},
  timestamp    = {Thu, 23 Jun 2022 19:58:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ausdm/VaiwsriRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChanyaswadDPM18,
  author       = {Thee Chanyaswad and
                  Alex Dytso and
                  H. Vincent Poor and
                  Prateek Mittal},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {{MVG} Mechanism: Differential Privacy under Matrix-Valued Query},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {230--246},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243750},
  doi          = {10.1145/3243734.3243750},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChanyaswadDPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BouraCGJPP18,
  author       = {Christina Boura and
                  Ilaria Chillotti and
                  Nicolas Gama and
                  Dimitar Jetchev and
                  Stanislav Peceny and
                  Alexander Petric},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {High-Precision Privacy-Preserving Real-Valued Function Evaluation},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {183--202},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_10},
  doi          = {10.1007/978-3-662-58387-6\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BouraCGJPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconference/VitakLKZK18,
  author       = {Jessica Vitak and
                  Yuting Liao and
                  Priya Kumar and
                  Michael T. Zimmer and
                  Katherine Kritikos},
  editor       = {Gobinda Chowdhury and
                  Julie McLeod and
                  Valerie J. Gillet and
                  Peter Willett},
  title        = {Privacy Attitudes and Data Valuation Among Fitness Tracker Users},
  booktitle    = {Transforming Digital Worlds - 13th International Conference, iConference
                  2018, Sheffield, UK, March 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10766},
  pages        = {229--239},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78105-1\_27},
  doi          = {10.1007/978-3-319-78105-1\_27},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconference/VitakLKZK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0003HNWXY18,
  author       = {Shaowei Wang and
                  Liusheng Huang and
                  Yiwen Nie and
                  Pengzhan Wang and
                  Hongli Xu and
                  Wei Yang},
  title        = {PrivSet: Set-Valued Data Analyses with Locale Differential Privacy},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {1088--1096},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486234},
  doi          = {10.1109/INFOCOM.2018.8486234},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/0003HNWXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/NiuZWTGC18,
  author       = {Chaoyue Niu and
                  Zhenzhe Zheng and
                  Fan Wu and
                  Shaojie Tang and
                  Xiaofeng Gao and
                  Guihai Chen},
  editor       = {Yike Guo and
                  Faisal Farooq},
  title        = {Unlocking the Value of Privacy: Trading Aggregate Statistics over
                  Private Correlated Data},
  booktitle    = {Proceedings of the 24th {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery {\&} Data Mining, {KDD} 2018, London, UK,
                  August 19-23, 2018},
  pages        = {2031--2040},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3219819.3220013},
  doi          = {10.1145/3219819.3220013},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/NiuZWTGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/taai/LinHS18,
  author       = {Wen{-}Yang Lin and
                  Kuang{-}Yung Hsu and
                  Zih{-}Xun Shen},
  title        = {Privacy-Preserving {SRS} Data Anonymization by Incorporating Missing
                  Values},
  booktitle    = {Conference on Technologies and Applications of Artificial Intelligence,
                  {TAAI} 2018, Taichung, Taiwan, November 30 - December 2, 2018},
  pages        = {106--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/TAAI.2018.00032},
  doi          = {10.1109/TAAI.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/taai/LinHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/Askinadze018,
  author       = {Alexander Askinadze and
                  Stefan Conrad},
  editor       = {Layth Sliman and
                  Ismael Bouassida Rodriguez and
                  Kaori Yoshida},
  title        = {Respecting Data Privacy in Educational Data Mining: An Approach to
                  the Transparent Handling of Student Data and Dealing with the Resulting
                  Missing Value Problem},
  booktitle    = {27th {IEEE} International Conference on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises, {WETICE} 2018, Paris, France, June
                  27-29, 2018},
  pages        = {160--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/WETICE.2018.00037},
  doi          = {10.1109/WETICE.2018.00037},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/Askinadze018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/TanSBBMB18,
  author       = {Joshua Tan and
                  Mahmood Sharif and
                  Sruti Bhagavatula and
                  Matthias Beckerle and
                  Michelle L. Mazurek and
                  Lujo Bauer},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Aaron Johnson},
  title        = {Comparing Hypothetical and Realistic Privacy Valuations},
  booktitle    = {Proceedings of the 2018 Workshop on Privacy in the Electronic Society,
                  WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018},
  pages        = {168--182},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267323.3268961},
  doi          = {10.1145/3267323.3268961},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/TanSBBMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-00823,
  author       = {Thee Chanyaswad and
                  Alex Dytso and
                  H. Vincent Poor and
                  Prateek Mittal},
  title        = {{MVG} Mechanism: Differential Privacy under Matrix-Valued Query},
  journal      = {CoRR},
  volume       = {abs/1801.00823},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.00823},
  eprinttype    = {arXiv},
  eprint       = {1801.00823},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-00823.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-10077,
  author       = {Thee Chanyaswad and
                  Alex Dytso and
                  H. Vincent Poor and
                  Prateek Mittal},
  title        = {A Differential Privacy Mechanism Design Under Matrix-Valued Query},
  journal      = {CoRR},
  volume       = {abs/1802.10077},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.10077},
  eprinttype    = {arXiv},
  eprint       = {1802.10077},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-10077.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05096,
  author       = {Martin Degeling and
                  Christine Utz and
                  Christopher Lentzsch and
                  Henry Hosseini and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's
                  Impact on Web Privacy},
  journal      = {CoRR},
  volume       = {abs/1808.05096},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05096},
  eprinttype    = {arXiv},
  eprint       = {1808.05096},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/DogruelJV17,
  author       = {Leyla Dogruel and
                  Sven J{\"{o}}ckel and
                  Jessica Vitak},
  title        = {The valuation of privacy premium features for smartphone apps: The
                  influence of defaults and expert recommendations},
  journal      = {Comput. Hum. Behav.},
  volume       = {77},
  pages        = {230--239},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2017.08.035},
  doi          = {10.1016/J.CHB.2017.08.035},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/DogruelJV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/TurgutB17,
  author       = {Damla Turgut and
                  Ladislau B{\"{o}}l{\"{o}}ni},
  title        = {Value of Information and Cost of Privacy in the Internet of Things},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {9},
  pages        = {62--66},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600625},
  doi          = {10.1109/MCOM.2017.1600625},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/TurgutB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/ChiHJLO17,
  author       = {Yuan Chi and
                  Jun Hong and
                  Anna Jurek and
                  Weiru Liu and
                  Dermot O'Reilly},
  title        = {Privacy preserving record linkage in the presence of missing values},
  journal      = {Inf. Syst.},
  volume       = {71},
  pages        = {199--210},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.is.2017.07.001},
  doi          = {10.1016/J.IS.2017.07.001},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/ChiHJLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/KarwatzkiDTV17,
  author       = {Sabrina Karwatzki and
                  Olga Dytynko and
                  Manuel Trenz and
                  Daniel Veit},
  title        = {Beyond the Personalization-Privacy Paradox: Privacy Valuation, Transparency
                  Features, and Service Personalization},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {369--400},
  year         = {2017},
  url          = {https://doi.org/10.1080/07421222.2017.1334467},
  doi          = {10.1080/07421222.2017.1334467},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/KarwatzkiDTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ShiH18,
  author       = {Xiujin Shi and
                  Yanling Hu},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{20998}}{\unicode{31867}}{\unicode{26641}}{\unicode{30340}}{\unicode{21160}}{\unicode{24577}}{\unicode{38598}}{\unicode{20540}}{\unicode{22411}}{\unicode{25968}}{\unicode{25454}}{\unicode{21457}}{\unicode{24067}}{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}}
                  (Privacy Preserving Based on Taxonomy Tree for Dynamic Set-valued
                  Data Publishing)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {5},
  pages        = {120--124},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.05.022},
  doi          = {10.11896/J.ISSN.1002-137X.2017.05.022},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ShiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/YangWX18,
  author       = {Yueping Yang and
                  Jian Wang and
                  Mingfu Xue},
  title        = {{\unicode{38754}}{\unicode{21521}}{\unicode{25935}}{\unicode{24863}}{\unicode{20540}}{\unicode{30340}}{\unicode{23618}}{\unicode{27425}}{\unicode{21270}}{\unicode{22810}}{\unicode{28304}}{\unicode{25968}}{\unicode{25454}}{\unicode{34701}}{\unicode{21512}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}}
                  (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive
                  Value)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {9},
  pages        = {156--161},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.09.030},
  doi          = {10.11896/J.ISSN.1002-137X.2017.09.030},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/YangWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/YinXS17,
  author       = {Chunyong Yin and
                  Jinwen Xi and
                  Ruxia Sun},
  title        = {Location Privacy Protection Based on Improved K-Value Method in Augmented
                  Reality on Mobile Devices},
  journal      = {Mob. Inf. Syst.},
  volume       = {2017},
  pages        = {7251395:1--7251395:7},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/7251395},
  doi          = {10.1155/2017/7251395},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/YinXS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/WongMWPC17,
  author       = {Richmond Y. Wong and
                  Deirdre K. Mulligan and
                  Ellen Van Wyk and
                  James Pierce and
                  John Chuang},
  title        = {Eliciting Values Reflections by Engaging Privacy Futures Using Design
                  Workbooks},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {1},
  number       = {{CSCW}},
  pages        = {111:1--111:26},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134746},
  doi          = {10.1145/3134746},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmhci/WongMWPC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/Syed17,
  author       = {Romilla Syed},
  title        = {Modeling Values of Internet of Things (IoT) Consumers' for Privacy
                  Decision-Making},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/AdvancesIS/Presentations/3},
  timestamp    = {Tue, 23 May 2017 14:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/Syed17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecsa/HalunenK17,
  author       = {Kimmo Halunen and
                  Anni Karinsalo},
  editor       = {Rog{\'{e}}rio de Lemos},
  title        = {Measuring the value of privacy and the efficacy of PETs},
  booktitle    = {11th European Conference on Software Architecture, {ECSA} 2017, Companion
                  Proceedings, Canterbury, United Kingdom, September 11-15, 2017},
  pages        = {132--135},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3129790.3129806},
  doi          = {10.1145/3129790.3129806},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecsa/HalunenK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RuffingM17,
  author       = {Tim Ruffing and
                  Pedro Moreno{-}Sanchez},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction
                  Privacy in Bitcoin},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {133--154},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_8},
  doi          = {10.1007/978-3-319-70278-0\_8},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RuffingM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MayleBMBT17,
  author       = {Alex Mayle and
                  Neda Hajiakhoond Bidoki and
                  Sina Masnadi and
                  Ladislau B{\"{o}}l{\"{o}}ni and
                  Damla Turgut},
  title        = {Investigating the Value of Privacy within the Internet of Things},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8253958},
  doi          = {10.1109/GLOCOM.2017.8253958},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/MayleBMBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PoikelaT17,
  author       = {Maija Poikela and
                  Eran Toch},
  editor       = {Tung Bui},
  title        = {Understanding the Valuation of Location Privacy: a Crowdsourcing-Based
                  Approach},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41395},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/PoikelaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/KarapiperisGV17,
  author       = {Dimitrios Karapiperis and
                  Aris Gkoulalas{-}Divanis and
                  Vassilios S. Verykios},
  title        = {Distance-Aware Encoding of Numerical Values for Privacy-Preserving
                  Record Linkage},
  booktitle    = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017,
                  San Diego, CA, USA, April 19-22, 2017},
  pages        = {135--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDE.2017.58},
  doi          = {10.1109/ICDE.2017.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/KarapiperisGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/BrowneOH17,
  author       = {Oliver Browne and
                  Philip O'Reilly and
                  Mark Hutchinson},
  editor       = {Yong Jin Kim and
                  Ritu Agarwal and
                  Jae Kyu Lee},
  title        = {Ephemeral Returns: Social Network Valuations and Perceived Privacy},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul,
                  South Korea, December 10-13, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/icis2017/Economics/Presentations/10},
  timestamp    = {Sun, 28 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/BrowneOH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/ChenLZ17,
  author       = {Shuo Chen and
                  Rongxing Lu and
                  Jie Zhang},
  editor       = {Jan{-}Philipp Stegh{\"{o}}fer and
                  Babak Esfandiari},
  title        = {A Flexible Privacy-Preserving Framework for Singular Value Decomposition
                  Under Internet of Things Environment},
  booktitle    = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {505},
  pages        = {21--37},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59171-1\_3},
  doi          = {10.1007/978-3-319-59171-1\_3},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/ChenLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/VervierZLZ17,
  author       = {Luisa Vervier and
                  Eva{-}Maria Zeissig and
                  Chantal Lidynia and
                  Martina Ziefle},
  editor       = {Muthu Ramachandran and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Verena Kantere and
                  Gary B. Wills and
                  Robert John Walters and
                  Victor Chang},
  title        = {Perceptions of Digital Footprints and the Value of Privacy},
  booktitle    = {Proceedings of the 2nd International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26,
                  2017},
  pages        = {80--91},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006301000800091},
  doi          = {10.5220/0006301000800091},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/VervierZLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/JungK17,
  author       = {Woojin Jung and
                  Hee{-}Woong Kim},
  editor       = {Rose Alinda Alias and
                  Pan Shan Ling and
                  Shamshul Bahri and
                  Patrick Finnegan and
                  Choon Ling Sia},
  title        = {Estimating the Monetary Value of Information Privacy in the Context
                  of {SNS}},
  booktitle    = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017,
                  Langkawi, Malaysia, July 16-20, 2017},
  pages        = {146},
  year         = {2017},
  url          = {http://aisel.aisnet.org/pacis2017/146},
  timestamp    = {Fri, 15 Sep 2017 09:22:54 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/JungK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/PuG17,
  author       = {Yu Pu and
                  Jens Grossklags},
  title        = {Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data
                  Matter?},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {339--355},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/pu},
  timestamp    = {Wed, 19 Jul 2017 17:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/PuG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/Chatzikokolakis17,
  author       = {Konstantinos Chatzikokolakis and
                  Serge Haddad and
                  Ali Kassem and
                  Catuscia Palamidessi},
  editor       = {Andrea Marin and
                  Benny Van Houdt and
                  Giuliano Casale and
                  Dorina C. Petriu and
                  Sabina Rossi},
  title        = {Trading Optimality for Performance in Location Privacy},
  booktitle    = {Proceedings of the 11th {EAI} International Conference on Performance
                  Evaluation Methodologies and Tools, {VALUETOOLS} 2017, Venice, Italy,
                  December 05-07, 2017},
  pages        = {221--222},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3150928.3150962},
  doi          = {10.1145/3150928.3150962},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/valuetools/Chatzikokolakis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/KalwarGKRA17,
  author       = {Safia Kalwar and
                  Eugenio Gianniti and
                  Joas Yannick Kinouani and
                  Youssef Ridene and
                  Danilo Ardagna},
  editor       = {Simonetta Balsamo and
                  Andrea Marin and
                  Enrico Vicario},
  title        = {Performance Degradation and Cost Impact Evaluation of Privacy Preserving
                  Mechanisms in Big Data Systems},
  booktitle    = {New Frontiers in Quantitative Methods in Informatics - 7th Workshop,
                  InfQ 2017, Venice, Italy, December 4, 2017, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {825},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-91632-3\_7},
  doi          = {10.1007/978-3-319-91632-3\_7},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/valuetools/KalwarGKRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenLZ17a,
  author       = {Shuo Chen and
                  Rongxing Lu and
                  Jie Zhang},
  title        = {A Flexible Privacy-preserving Framework for Singular Value Decomposition
                  under Internet of Things Environment},
  journal      = {CoRR},
  volume       = {abs/1703.06659},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.06659},
  eprinttype    = {arXiv},
  eprint       = {1703.06659},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/ChenLZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04767,
  author       = {Miltiades E. Anagnostou and
                  Maria A. Lambrou},
  title        = {A review of approaches to the value of privacy},
  journal      = {CoRR},
  volume       = {abs/1709.04767},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04767},
  eprinttype    = {arXiv},
  eprint       = {1709.04767},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCGJPP17,
  author       = {Christina Boura and
                  Ilaria Chillotti and
                  Nicolas Gama and
                  Dimitar Jetchev and
                  Stanislav Peceny and
                  Alexander Petric},
  title        = {High-Precision Privacy-Preserving Real-Valued Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1234},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCGJPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/HirschprungTBM16,
  author       = {Ron S. Hirschprung and
                  Eran Toch and
                  Frank John Bolton and
                  Oded Maimon},
  title        = {A methodology for estimating the value of privacy in information disclosure
                  systems},
  journal      = {Comput. Hum. Behav.},
  volume       = {61},
  pages        = {443--453},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.chb.2016.03.033},
  doi          = {10.1016/J.CHB.2016.03.033},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/HirschprungTBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/NguyenRJ16,
  author       = {Kenneth D. Nguyen and
                  Heather Rosoff and
                  Richard S. John},
  title        = {The effects of attacker identity and individual user characteristics
                  on the value of information privacy},
  journal      = {Comput. Hum. Behav.},
  volume       = {55},
  pages        = {372--383},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.chb.2015.09.031},
  doi          = {10.1016/J.CHB.2015.09.031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/NguyenRJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Moore16,
  author       = {Adam D. Moore},
  title        = {Privacy, speech, and values: what we have no business knowing},
  journal      = {Ethics Inf. Technol.},
  volume       = {18},
  number       = {1},
  pages        = {41--49},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10676-016-9397-x},
  doi          = {10.1007/S10676-016-9397-X},
  timestamp    = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Moore16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/ZhangJZW16,
  author       = {Wujun Zhang and
                  Shunrong Jiang and
                  Xiaoyan Zhu and
                  Yumin Wang},
  title        = {Cooperative downloading with privacy preservation and access control
                  for value-added services in VANETs},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {7},
  number       = {1},
  pages        = {50--60},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJGUC.2016.073778},
  doi          = {10.1504/IJGUC.2016.073778},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijguc/ZhangJZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/MaitlandBO16,
  author       = {Nadine Barrett Maitland and
                  Corlane Barclay and
                  Kweku{-}Muata Osei{-}Bryson},
  title        = {Security in Social Networking Services: {A} Value-Focused Thinking
                  Exploration in Understanding Users' Privacy and Security Concerns},
  journal      = {Inf. Technol. Dev.},
  volume       = {22},
  number       = {3},
  pages        = {464--486},
  year         = {2016},
  url          = {https://doi.org/10.1080/02681102.2016.1173002},
  doi          = {10.1080/02681102.2016.1173002},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/MaitlandBO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SidgmanC16,
  author       = {Juergen Sidgman and
                  Malcolm Crompton},
  title        = {Valuing Personal Data to Foster Privacy: {A} Thought Experiment and
                  Opportunities for Research},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {169--181},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51429},
  doi          = {10.2308/ISYS-51429},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SidgmanC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/libt/CampbellC16,
  author       = {D. Grant Campbell and
                  Scott R. Cowan},
  title        = {The Paradox of Privacy: Revisiting a Core Library Value in an Age
                  of Big Data and Linked Data},
  journal      = {Libr. Trends},
  volume       = {64},
  number       = {3},
  pages        = {492--511},
  year         = {2016},
  url          = {https://doi.org/10.1353/lib.2016.0006},
  doi          = {10.1353/LIB.2016.0006},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/libt/CampbellC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PuG16,
  author       = {Yu Pu and
                  Jens Grossklags},
  title        = {Towards a Model on the Factors Influencing Social App Users' Valuation
                  of Interdependent Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {2},
  pages        = {61--81},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0005},
  doi          = {10.1515/POPETS-2016-0005},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/PuG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HasanJLLC16,
  author       = {A. S. M. Touhidul Hasan and
                  Qingshan Jiang and
                  Jun Luo and
                  Chengming Li and
                  Lifei Chen},
  title        = {An effective value swapping method for privacy preserving data publishing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3219--3228},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1527},
  doi          = {10.1002/SEC.1527},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HasanJLLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/teco/ChenCKMV16,
  author       = {Yiling Chen and
                  Stephen Chong and
                  Ian A. Kash and
                  Tal Moran and
                  Salil P. Vadhan},
  title        = {Truthful Mechanisms for Agents That Value Privacy},
  journal      = {{ACM} Trans. Economics and Comput.},
  volume       = {4},
  number       = {3},
  pages        = {13:1--13:30},
  year         = {2016},
  url          = {https://doi.org/10.1145/2892555},
  doi          = {10.1145/2892555},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/teco/ChenCKMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QinYYKXR16,
  author       = {Zhan Qin and
                  Yin Yang and
                  Ting Yu and
                  Issa Khalil and
                  Xiaokui Xiao and
                  Kui Ren},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Heavy Hitter Estimation over Set-Valued Data with Local Differential
                  Privacy},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {192--203},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978409},
  doi          = {10.1145/2976749.2978409},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/QinYYKXR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhangYGZ16,
  author       = {Mengyuan Zhang and
                  Lei Yang and
                  Xiaowen Gong and
                  Junshan Zhang},
  title        = {Privacy-Preserving Crowdsensing: Privacy Valuation, Network Effect,
                  and Profit Maximization},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842170},
  doi          = {10.1109/GLOCOM.2016.7842170},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhangYGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KatellMS16,
  author       = {Michael A. Katell and
                  Sonali R. Mishra and
                  Ligaya Scaff},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {A Fair Exchange: Exploring How Online Privacy is Valued},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {1881--1890},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.239},
  doi          = {10.1109/HICSS.2016.239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/KatellMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarakatBNG16,
  author       = {Sara Barakat and
                  Bechara al Bouna and
                  Mohamed Nassar and
                  Christophe Guyeux},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {On the Evaluation of the Privacy Breach in Disassociated Set-valued
                  Datasets},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {318--326},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969403180326},
  doi          = {10.5220/0005969403180326},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarakatBNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/WangYZ16,
  author       = {Weina Wang and
                  Lei Ying and
                  Junshan Zhang},
  editor       = {Sara Alouf and
                  Alain Jean{-}Marie and
                  Nidhi Hegde and
                  Alexandre Prouti{\`{e}}re},
  title        = {The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms
                  and Fundamental Limits},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGMETRICS} International Conference
                  on Measurement and Modeling of Computer Science, Antibes Juan-Les-Pins,
                  France, June 14-18, 2016},
  pages        = {249--260},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2896377.2901461},
  doi          = {10.1145/2896377.2901461},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/WangYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/AbokhodairAVM16,
  author       = {Norah Abokhodair and
                  Sofiane Abbar and
                  Sarah Vieweg and
                  Yelena Mejova},
  editor       = {Wolfgang Nejdl and
                  Wendy Hall and
                  Paolo Parigi and
                  Steffen Staab},
  title        = {Privacy and twitter in qatar: traditional values in the digital world},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Web Science, WebSci 2016,
                  Hannover, Germany, May 22-25, 2016},
  pages        = {66--77},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2908131.2908146},
  doi          = {10.1145/2908131.2908146},
  timestamp    = {Sat, 09 Apr 2022 12:47:40 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/AbokhodairAVM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbokhodairAVM16,
  author       = {Norah Abokhodair and
                  Sofiane Abbar and
                  Sarah Vieweg and
                  Yelena Mejova},
  title        = {Privacy and Twitter in Qatar: Traditional Values in the Digital World},
  journal      = {CoRR},
  volume       = {abs/1605.01741},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.01741},
  eprinttype    = {arXiv},
  eprint       = {1605.01741},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbokhodairAVM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BarakatBNG16,
  author       = {Sara Barakat and
                  Bechara al Bouna and
                  Mohamed Nassar and
                  Christophe Guyeux},
  title        = {On the Evaluation of the Privacy Breach in Disassociated Set-Valued
                  Datasets},
  journal      = {CoRR},
  volume       = {abs/1611.08417},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.08417},
  eprinttype    = {arXiv},
  eprint       = {1611.08417},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BarakatBNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangYZ16,
  author       = {Weina Wang and
                  Lei Ying and
                  Junshan Zhang},
  title        = {The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms
                  and Fundamental Limits},
  journal      = {CoRR},
  volume       = {abs/1603.06870},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.06870},
  eprinttype    = {arXiv},
  eprint       = {1603.06870},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/WangYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangLHY15,
  author       = {Xuezhen Huang and
                  Jiqiang Liu and
                  Zhen Han and
                  Jun Yang},
  title        = {Privacy beyond sensitive values},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {7},
  pages        = {1--15},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-014-5232-3},
  doi          = {10.1007/S11432-014-5232-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuangLHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/0009WQDL15,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Bo Qin and
                  Josep Domingo{-}Ferrer and
                  Bao Liu},
  title        = {Practical secure and privacy-preserving scheme for value-added applications
                  in VANETs},
  journal      = {Comput. Commun.},
  volume       = {71},
  pages        = {50--60},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.08.005},
  doi          = {10.1016/J.COMCOM.2015.08.005},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/0009WQDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Preibusch15,
  author       = {S{\"{o}}ren Preibusch},
  title        = {The Value of Web Search Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {5},
  pages        = {24--32},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.109},
  doi          = {10.1109/MSP.2015.109},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Preibusch15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jits/AntoniouP15,
  author       = {Constantinos Antoniou and
                  Amalia Polydoropoulou},
  title        = {The Value of Privacy: Evidence From the Use of Mobile Devices for
                  Traveler Information Systems},
  journal      = {J. Intell. Transp. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {167--180},
  year         = {2015},
  url          = {https://doi.org/10.1080/15472450.2014.936284},
  doi          = {10.1080/15472450.2014.936284},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jits/AntoniouP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/ShahDJ15,
  author       = {Anand Shah and
                  Shishir Dahake and
                  Sri Hari Haran J.},
  title        = {Valuing data security and privacy using cyber insurance},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {45},
  number       = {1},
  pages        = {38--41},
  year         = {2015},
  url          = {https://doi.org/10.1145/2738210.2738217},
  doi          = {10.1145/2738210.2738217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/ShahDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/Darbanhosseiniamirkhiz15,
  author       = {Mirmahdi Darbanhosseiniamirkhiz and
                  Shuyuan Deng and
                  Dong{-}Heon Kwak and
                  Greta L. Polites},
  title        = {The Moderating Role of Espoused National Cultural Values on Perceptions
                  of Privacy Assurance Mechanisms},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/2},
  timestamp    = {Sun, 13 Dec 2015 13:10:52 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/Darbanhosseiniamirkhiz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/0001HBCPPMLHGGB15,
  author       = {Adrian Popescu and
                  Mireille Hildebrandt and
                  Jonas Breuer and
                  Laurence Claeys and
                  Symeon Papadopoulos and
                  Georgios Petkos and
                  Theodoros Michalareas and
                  David Lund and
                  Rob Heyman and
                  Shenja van der Graaf and
                  Etienne Gadeski and
                  Herv{\'{e}} Le Borgne and
                  K. deVries and
                  Timotheos Kastrinogiannis and
                  Apostolos Kousaridas and
                  Ali Padyab},
  editor       = {Bettina Berendt and
                  Thomas Engel and
                  Demosthenes Ikonomou and
                  Daniel Le M{\'{e}}tayer and
                  Stefan Schiffner},
  title        = {Increasing Transparency and Privacy for Online Social Network Users
                  - {USEMP} Value Model, Scoring Framework and Legal},
  booktitle    = {Privacy Technologies and Policy - Third Annual Privacy Forum, {APF}
                  2015, Luxembourg, October 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9484},
  pages        = {38--59},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31456-3\_3},
  doi          = {10.1007/978-3-319-31456-3\_3},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apf/0001HBCPPMLHGGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigda/Barker15,
  author       = {Ken Barker},
  editor       = {Naveen Kumar and
                  Vasudha Bhatnagar},
  title        = {Privacy Protection or Data Value: Can We Have Both?},
  booktitle    = {Big Data Analytics - 4th International Conference, {BDA} 2015, Hyderabad,
                  India, December 15-18, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9498},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27057-9\_1},
  doi          = {10.1007/978-3-319-27057-9\_1},
  timestamp    = {Thu, 23 Jun 2022 19:58:41 +0200},
  biburl       = {https://dblp.org/rec/conf/bigda/Barker15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/AdamopoulosT15,
  author       = {Panagiotis Adamopoulos and
                  Alexander Tuzhilin},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {The Business Value of Recommendations: {A} Privacy-Preserving Econometric
                  Analysis},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/GeneralIS/12},
  timestamp    = {Wed, 09 Oct 2019 12:51:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/AdamopoulosT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/AlashoorKLS15,
  author       = {Tawfiq Alashoor and
                  Mark Keil and
                  Leigh Liu and
                  H. Jeff Smith},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {How Values Shape Concerns about Privacy for Self and Others},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/8},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/AlashoorKLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/PuG15,
  author       = {Yu Pu and
                  Jens Grossklags},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {Using Conjoint Analysis to Investigate the Value of Interdependent
                  Privacy in Social App Adoption Scenarios},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/12},
  timestamp    = {Sun, 13 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/PuG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Cofone15,
  author       = {Ignacio Cofone},
  title        = {The Value of Privacy: Keeping the Money Where the Mouth is},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_cofone.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/Cofone15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/StarkT14,
  author       = {Luke Stark and
                  Matt Tierney},
  title        = {Lockbox: mobility, privacy and values in cloud storage},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {1--13},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-013-9328-z},
  doi          = {10.1007/S10676-013-9328-Z},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/StarkT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/KeyvanpourM14,
  author       = {Mohammad Reza Keyvanpour and
                  Somayyeh Seifi Moradi},
  title        = {A Perturbation Method Based on Singular Value Decomposition and Feature
                  Selection for Privacy Preserving Data Mining},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {10},
  number       = {1},
  pages        = {55--76},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdwm.2014010104},
  doi          = {10.4018/IJDWM.2014010104},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdwm/KeyvanpourM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jices/SteevesR14,
  author       = {Valerie Steeves and
                  Priscilla M. Regan},
  title        = {Young people online and the social value of privacy},
  journal      = {J. Inf. Commun. Ethics Soc.},
  volume       = {12},
  number       = {4},
  pages        = {298--313},
  year         = {2014},
  url          = {https://doi.org/10.1108/JICES-01-2014-0004},
  doi          = {10.1108/JICES-01-2014-0004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jices/SteevesR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/LiS14,
  author       = {Xiao{-}Bai Li and
                  Sumit Sarkar},
  title        = {Digression and Value Concatenation to Enable Privacy-Preserving Regression},
  journal      = {{MIS} Q.},
  volume       = {38},
  number       = {3},
  pages        = {679--698},
  year         = {2014},
  url          = {https://doi.org/10.25300/misq/2014/38.3.03},
  doi          = {10.25300/MISQ/2014/38.3.03},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/LiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/GhazinourRB14,
  author       = {Kambiz Ghazinour and
                  Amir Hossein Razavi and
                  Ken Barker},
  title        = {A Model for Privacy Compromisation Value},
  booktitle    = {The 5th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN-2014)/} The 4th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare {(ICTH} 2014)/ Affiliated Workshops, September 22-25,
                  2014, Halifax, Nova Scotia, Canada},
  series       = {Procedia Computer Science},
  volume       = {37},
  pages        = {143--152},
  publisher    = {Elsevier},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.procs.2014.08.023},
  doi          = {10.1016/J.PROCS.2014.08.023},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/euspn/GhazinourRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ZhuTXY14,
  author       = {Hong Zhu and
                  Shengli Tian and
                  Meiyi Xie and
                  Mengyuan Yang},
  title        = {Preserving privacy for sensitive values of individuals in data publishing
                  based on a new additive noise approach},
  booktitle    = {23rd International Conference on Computer Communication and Networks,
                  {ICCCN} 2014, Shanghai, China, August 4-7, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCCN.2014.6911855},
  doi          = {10.1109/ICCCN.2014.6911855},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ZhuTXY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/MotiwallaLL14,
  author       = {Luvai F. Motiwalla and
                  Xiaobai (Bob) Li and
                  Xiaoping Liu},
  editor       = {Keng Siau and
                  Qing Li and
                  Xunhua Guo},
  title        = {Privacy Paradox: Does Stated Privacy Concerns Translate into the Valuation
                  of Personal Information?},
  booktitle    = {18th Pacific Asia Conference on Information Systems, {PACIS} 2014,
                  Chengdu, China, June 24-28, 2014},
  pages        = {281},
  year         = {2014},
  url          = {http://aisel.aisnet.org/pacis2014/281},
  timestamp    = {Tue, 25 Nov 2014 12:58:45 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/MotiwallaLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/Lieshout14,
  author       = {Marc van Lieshout},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Marit Hansen},
  title        = {The Value of Personal Data},
  booktitle    = {Privacy and Identity Management for the Future Internet in the Age
                  of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG
                  9.2.2 International Summer School, Patras, Greece, September 7-12,
                  2014, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {457},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-18621-4\_3},
  doi          = {10.1007/978-3-319-18621-4\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/Lieshout14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/MartinAY14,
  author       = {Yod Samuel Mart{\'{\i}}n and
                  Jos{\'{e}} M. del {\'{A}}lamo and
                  Juan C. Yelmo},
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {Engineering privacy requirements valuable lessons from another realm},
  booktitle    = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements
                  Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890523},
  doi          = {10.1109/ESPRE.2014.6890523},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/MartinAY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NaldiD14,
  author       = {Maurizio Naldi and
                  Giuseppe D'Acquisto},
  title        = {Differential privacy for counting queries: can Bayes estimation help
                  uncover the true value?},
  journal      = {CoRR},
  volume       = {abs/1407.0116},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.0116},
  eprinttype    = {arXiv},
  eprint       = {1407.0116},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NaldiD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FranzDHJKS13,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure computations on non-integer values with applications to privacy-preserving
                  sequence analysis},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {117--128},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.001},
  doi          = {10.1016/J.ISTR.2012.10.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FranzDHJKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JainPTU13,
  author       = {Priyank Jain and
                  Neelam Pathak and
                  Pratibha Tapashetti and
                  A. S. Umesh},
  title        = {Privacy preserving processing of data decision tree based on sample
                  selection and Singular Value Decomposition},
  booktitle    = {9th International Conference on Information Assurance and Security,
                  {IAS} 2013, Gammarth, Tunisia, December 4-6, 2013},
  pages        = {91--95},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIAS.2013.6947739},
  doi          = {10.1109/ISIAS.2013.6947739},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JainPTU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/ChoiJ13,
  author       = {Chun Fung (Ben) Choi and
                  Zhenhui Jiang},
  editor       = {Richard L. Baskerville and
                  Michael Chau},
  title        = {Trading Friendship for Value: An Investigation of Collective Privacy
                  Concerns in Social Application Usage},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/81},
  timestamp    = {Wed, 30 Oct 2019 17:01:36 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/ChoiJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangJZW13,
  author       = {Wujun Zhang and
                  Shunrong Jiang and
                  Xiaoyan Zhu and
                  Yumin Wang},
  title        = {Privacy-Preserving Cooperative Downloading for Value-Added Services
                  in VANETs},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {358--362},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.67},
  doi          = {10.1109/INCOS.2013.67},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangJZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ChristinBL13,
  author       = {Delphine Christin and
                  Christian Buchner and
                  Niklas Leibecke},
  title        = {What's the value of your privacy? Exploring factors that influence
                  privacy-sensitive contributions to participatory sensing applications},
  booktitle    = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney,
                  Australia, October 21-24, 2013 - Workshop Proceedings},
  pages        = {918--923},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/LCNW.2013.6758532},
  doi          = {10.1109/LCNW.2013.6758532},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ChristinBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/HeymanP13,
  author       = {Rob Heyman and
                  Jo Pierson},
  editor       = {Marit Hansen and
                  Jaap{-}Henk Hoepman and
                  Ronald E. Leenes and
                  Diane Whitehouse},
  title        = {An Explorative Mapping of the Belgian Social Media Marketing Value
                  Network and Its Usage of Personal Identifiable Information},
  booktitle    = {Privacy and Identity Management for Emerging Services and Technologies
                  - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer
                  School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {421},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-55137-6\_16},
  doi          = {10.1007/978-3-642-55137-6\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/HeymanP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ChenCKMV13,
  author       = {Yiling Chen and
                  Stephen Chong and
                  Ian A. Kash and
                  Tal Moran and
                  Salil P. Vadhan},
  editor       = {Michael J. Kearns and
                  R. Preston McAfee and
                  {\'{E}}va Tardos},
  title        = {Truthful mechanisms for agents that value privacy},
  booktitle    = {Proceedings of the fourteenth {ACM} Conference on Electronic Commerce,
                  {EC} 2013, Philadelphia, PA, USA, June 16-20, 2013},
  pages        = {215--232},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492002.2482549},
  doi          = {10.1145/2492002.2482549},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigecom/ChenCKMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChhinkaniwalaG13,
  author       = {Hitesh Chhinkaniwala and
                  Sanjay Garg},
  title        = {Tuple Value Based Multiplicative Data Perturbation Approach To Preserve
                  Privacy In Data Stream Mining},
  journal      = {CoRR},
  volume       = {abs/1306.1334},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.1334},
  eprinttype    = {arXiv},
  eprint       = {1306.1334},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChhinkaniwalaG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/XuCB12,
  author       = {Heng Xu and
                  Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {A Value Sensitive Design Investigation of Privacy Enhancing Tools
                  in Web Browsers},
  journal      = {Decis. Support Syst.},
  volume       = {54},
  number       = {1},
  pages        = {424--433},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.dss.2012.06.003},
  doi          = {10.1016/J.DSS.2012.06.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/XuCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/LiW12,
  author       = {Guang Li and
                  Yadong Wang},
  title        = {A Privacy-Preserving Classification Method Based on Singular Value
                  Decomposition},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {9},
  number       = {6},
  pages        = {529--534},
  year         = {2012},
  url          = {http://www.ccis2k.org/iajit/PDF/vol.9\%2cno.6/2990-5.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/LiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChanHD12,
  author       = {Ellen Chan and
                  Robert R. Harmon and
                  Haluk Demirkan},
  title        = {Privacy and Value Co-creation for IT-Enabled Service Systems: Cui
                  Bono?},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {1573--1582},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.485},
  doi          = {10.1109/HICSS.2012.485},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ChanHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SpiekermannKB12,
  author       = {Sarah Spiekermann and
                  Jana Korunovska and
                  Christine Bauer},
  title        = {Psychology of Ownership and Asset Defense: Why people value their
                  personal information beyond privacy},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2012, Orlando, Florida, USA, December 16-19, 2012},
  publisher    = {Association for Information Systems},
  year         = {2012},
  url          = {http://aisel.aisnet.org/icis2012/proceedings/ISSecurity/1},
  timestamp    = {Sat, 21 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/SpiekermannKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/ZhaoL12,
  author       = {Su{-}Yun Zhao and
                  Si Lin},
  title        = {Interval valued fuzzy rough classifier and its application on privacy
                  protection},
  booktitle    = {International Conference on Machine Learning and Cybernetics, {ICMLC}
                  2012, Xian, Shaanxi, China, July 15-17, 2012, Proceedings},
  pages        = {255--260},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICMLC.2012.6358921},
  doi          = {10.1109/ICMLC.2012.6358921},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/ZhaoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/ZhangWQD12,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Bo Qin and
                  Josep Domingo{-}Ferrer},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {Practical Privacy for Value-Added Applications in Vehicular Ad Hoc
                  Networks},
  booktitle    = {Internet and Distributed Computing Systems - 5th International Conference,
                  {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7646},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34883-9\_4},
  doi          = {10.1007/978-3-642-34883-9\_4},
  timestamp    = {Thu, 09 Mar 2023 09:06:05 +0100},
  biburl       = {https://dblp.org/rec/conf/idcs/ZhangWQD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangWW12,
  author       = {Xilin Zhang and
                  Yingjie Wu and
                  Xiaodong Wang},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Differential Privacy Data Release through Adding Noise on Average
                  Value},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {417--429},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_32},
  doi          = {10.1007/978-3-642-34601-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/Hugl11,
  author       = {Ulrike Hugl},
  title        = {Reviewing Person's Value of Privacy of Online Social Networking},
  journal      = {Internet Res.},
  volume       = {21},
  number       = {4},
  pages        = {384--407},
  year         = {2011},
  url          = {https://doi.org/10.1108/10662241111158290},
  doi          = {10.1108/10662241111158290},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/Hugl11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ChenMFDX11,
  author       = {Rui Chen and
                  Noman Mohammed and
                  Benjamin C. M. Fung and
                  Bipin C. Desai and
                  Li Xiong},
  title        = {Publishing Set-Valued Data via Differential Privacy},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {4},
  number       = {11},
  pages        = {1087--1098},
  year         = {2011},
  url          = {http://www.vldb.org/pvldb/vol4/p1087-chen.pdf},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ChenMFDX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author       = {Kirill Levchenko and
                  Andreas Pitsillidis and
                  Neha Chachra and
                  Brandon Enright and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Chris Grier and
                  Tristan Halvorson and
                  Chris Kanich and
                  Christian Kreibich and
                  He Liu and
                  Damon McCoy and
                  Nicholas Weaver and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {431--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.24},
  doi          = {10.1109/SP.2011.24},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5472,
  author       = {Yiling Chen and
                  Stephen Chong and
                  Ian A. Kash and
                  Tal Moran and
                  Salil P. Vadhan},
  title        = {Truthful Mechanisms for Agents that Value Privacy},
  journal      = {CoRR},
  volume       = {abs/1111.5472},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.5472},
  eprinttype    = {arXiv},
  eprint       = {1111.5472},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-5472.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datascience/LiW10,
  author       = {Guang Li and
                  Yadong Wang},
  title        = {A Privacy-Preserving Data Mining Method Based on Singular Value Decomposition
                  and Independent Component Analysis},
  journal      = {Data Sci. J.},
  volume       = {9},
  pages        = {124--132},
  year         = {2010},
  url          = {https://doi.org/10.2481/dsj.009-025},
  doi          = {10.2481/DSJ.009-025},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datascience/LiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/Al-Fedaghi10,
  author       = {Sabah Saleh Al{-}Fedaghi},
  title        = {Information Privacy and its Value},
  booktitle    = {Intelligent Information Privacy Management, Papers from the 2010 {AAAI}
                  Spring Symposium, Technical Report SS-10-05, Stanford, California,
                  USA, March 22-24, 2010},
  publisher    = {{AAAI}},
  year         = {2010},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1038},
  timestamp    = {Fri, 17 Feb 2012 13:37:51 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/Al-Fedaghi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/Hugl10,
  author       = {Ulrike Hugl},
  editor       = {Martin Santana and
                  Jerry N. Luftman and
                  Ajay S. Vinze},
  title        = {Approaching the value of Privacy: Review of theoretical privacy concepts
                  and aspects of privacy management},
  booktitle    = {Sustainable {IT} Collaboration Around the Globe. 16th Americas Conference
                  on Information Systems, {AMCIS} 2010, Lima, Peru, August 12-15, 2010},
  pages        = {248},
  publisher    = {Association for Information Systems},
  year         = {2010},
  url          = {http://aisel.aisnet.org/amcis2010/248},
  timestamp    = {Mon, 02 Jan 2012 14:47:22 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/Hugl10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bncod/Barker10,
  author       = {Ken Barker},
  editor       = {Lachlan M. MacKinnon},
  title        = {"Valuing" Privacy While Exposing Data Utility},
  booktitle    = {Data Security and Security Data - 27th British National Conference
                  on Databases, {BNCOD} 27, Dundee, UK, June 29 - July 1, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6121},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25704-9\_1},
  doi          = {10.1007/978-3-642-25704-9\_1},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bncod/Barker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceb2/Mak10,
  author       = {Stephen Mak},
  editor       = {Ajay Kumar and
                  David Zhang},
  title        = {Ethical Values for E-Society: Information, Security and Privacy},
  booktitle    = {Ethics and Policy of Biometrics - Third International Conference on
                  Ethics and Policy of Biometrics and International Data Sharing, {ICEB}
                  2010, Hong Kong, January 4-5, 2010. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6005},
  pages        = {96--101},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12595-9\_13},
  doi          = {10.1007/978-3-642-12595-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iceb2/Mak10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipmu/Wiese10,
  author       = {Lena Wiese},
  editor       = {Eyke H{\"{u}}llermeier and
                  Rudolf Kruse and
                  Frank Hoffmann},
  title        = {Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued
                  Privacy Policies},
  booktitle    = {Computational Intelligence for Knowledge-Based Systems Design, 13th
                  International Conference on Information Processing and Management
                  of Uncertainty, {IPMU} 2010, Dortmund, Germany, June 28 - July 2,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6178},
  pages        = {655--664},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14049-5\_67},
  doi          = {10.1007/978-3-642-14049-5\_67},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipmu/Wiese10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/MotiwallaL10,
  author       = {Luvai F. Motiwalla and
                  Xiaobai (Bob) Li},
  title        = {Value Added Privacy Services for Healthcare Data},
  booktitle    = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA,
                  July 5-10, 2010},
  pages        = {64--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SERVICES.2010.42},
  doi          = {10.1109/SERVICES.2010.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/MotiwallaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BezziVLS10,
  author       = {Michele Bezzi and
                  Sabrina De Capitani di Vimercati and
                  Giovanni Livraga and
                  Pierangela Samarati},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner},
  title        = {Protecting Privacy of Sensitive Value Distributions in Data Release},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_17},
  doi          = {10.1007/978-3-642-22444-7\_17},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BezziVLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webist/MirallesRG10,
  author       = {Francesc Miralles and
                  Rosa Rudo and
                  Ferran Giones},
  editor       = {Joaquim Filipe and
                  Jos{\'{e}} Cordeiro},
  title        = {Cultural Values Influence on the Adoption of Privacy Threatening Social
                  Networks Features},
  booktitle    = {{WEBIST} 2010, Proceedings of the 6th International Conference on
                  Web Information Systems and Technologies, Volume 2, Valencia, Spain,
                  April 7-10, 2010},
  pages        = {379--382},
  publisher    = {{INSTICC} Press},
  year         = {2010},
  timestamp    = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl       = {https://dblp.org/rec/conf/webist/MirallesRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/RenegarM09,
  author       = {Benjamin D. Renegar and
                  Katina Michael},
  title        = {Privacy-value-control harmonization for {RFID} adoption in retail},
  journal      = {{IBM} J. Res. Dev.},
  volume       = {53},
  number       = {2},
  pages        = {8},
  year         = {2009},
  url          = {https://doi.org/10.1147/JRD.2009.5429050},
  doi          = {10.1147/JRD.2009.5429050},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmrd/RenegarM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Birch09,
  author       = {David G. W. Birch},
  title        = {Victorian values: Politicians and the public incorrectly see security
                  and privacy as opposites},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {3},
  pages        = {143--145},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2009.10.006},
  doi          = {10.1016/J.ISTR.2009.10.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Birch09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/HuangHHLSZJZ09,
  author       = {Xin Huang and
                  Yin He and
                  Yifan Hou and
                  Lisi Li and
                  Lan Sun and
                  Sina Zhang and
                  Yang Jiang and
                  Tingting Zhang},
  editor       = {Martin Gilje Jaatun and
                  Gansen Zhao and
                  Chunming Rong},
  title        = {Privacy of Value-Added Context-Aware Service Cloud},
  booktitle    = {Cloud Computing, First International Conference, CloudCom 2009, Beijing,
                  China, December 1-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5931},
  pages        = {547--552},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10665-1\_50},
  doi          = {10.1007/978-3-642-10665-1\_50},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/HuangHHLSZJZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/WasserZ09,
  author       = {Benjamin Wasser and
                  Justin Zhan},
  title        = {Practical Values for Privacy},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {343--346},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.477},
  doi          = {10.1109/CSE.2009.477},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/WasserZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DinevXS09,
  author       = {Tamara Dinev and
                  Heng Xu and
                  H. Jeff Smith},
  title        = {Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis
                  of Web 2.0 Privacy},
  booktitle    = {42st Hawaii International International Conference on Systems Science
                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January
                  2009, Waikoloa, Big Island, HI, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HICSS.2009.255},
  doi          = {10.1109/HICSS.2009.255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DinevXS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/HanNY09,
  author       = {Shuguo Han and
                  Wee Keong Ng and
                  Philip S. Yu},
  editor       = {Yannis E. Ioannidis and
                  Dik Lun Lee and
                  Raymond T. Ng},
  title        = {Privacy-Preserving Singular Value Decomposition},
  booktitle    = {Proceedings of the 25th International Conference on Data Engineering,
                  {ICDE} 2009, March 29 2009 - April 2 2009, Shanghai, China},
  pages        = {1267--1270},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDE.2009.217},
  doi          = {10.1109/ICDE.2009.217},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/HanNY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/KrasnovaHG09,
  author       = {Hanna Krasnova and
                  Thomas Hildebrand and
                  Oliver G{\"{u}}nther},
  editor       = {Jay F. Nunamaker Jr. and
                  Wendy L. Currie},
  title        = {Investigating the Value of Privacy in Online Social Networks: Conjoint
                  Analysis},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2009, Phoenix, Arizona, USA, December 15-18, 2009},
  pages        = {173},
  publisher    = {Association for Information Systems},
  year         = {2009},
  url          = {http://aisel.aisnet.org/icis2009/173},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/KrasnovaHG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/BertholdB09,
  author       = {Stefan Berthold and
                  Rainer B{\"{o}}hme},
  title        = {Valuating Privacy with Option Pricing Theory},
  booktitle    = {8th Annual Workshop on the Economics of Information Security, {WEIS}
                  2009, University College London, England, UK, June 24-25, 2009},
  year         = {2009},
  url          = {http://weis09.infosecon.net/files/128/index.html},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/BertholdB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/TerrovitisMK08,
  author       = {Manolis Terrovitis and
                  Nikos Mamoulis and
                  Panos Kalnis},
  title        = {Privacy-preserving anonymization of set-valued data},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {1},
  number       = {1},
  pages        = {115--125},
  year         = {2008},
  url          = {http://www.vldb.org/pvldb/vol1/1453874.pdf},
  doi          = {10.14778/1453856.1453874},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/TerrovitisMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/XuIZX08,
  author       = {Heng Xu and
                  Nazneen Irani and
                  Sencun Zhu and
                  Wei Xu},
  title        = {Alleviating Parental Concerns for Children's Online Privacy: {A} Value
                  Sensitive Design Investigation},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2008, Paris, France, December 14-17, 2008},
  pages        = {106},
  publisher    = {Association for Information Systems},
  year         = {2008},
  url          = {http://aisel.aisnet.org/icis2008/106},
  timestamp    = {Wed, 28 Dec 2011 12:50:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/XuIZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wafr/OKane08,
  author       = {Jason M. O'Kane},
  editor       = {Howie Choset and
                  Marco Morales and
                  Todd D. Murphey},
  title        = {On the Value of Ignorance: Balancing Tracking and Privacy Using a
                  Two-Bit Sensor},
  booktitle    = {Algorithmic Foundation of Robotics VIII, Selected Contributions of
                  the Eight International Workshop on the Algorithmic Foundations of
                  Robotics, {WAFR} 2008, Guanajuato, Mexico, December 7-9, 2008},
  series       = {Springer Tracts in Advanced Robotics},
  volume       = {57},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00312-7\_15},
  doi          = {10.1007/978-3-642-00312-7\_15},
  timestamp    = {Fri, 04 Feb 2022 12:19:08 +0100},
  biburl       = {https://dblp.org/rec/conf/wafr/OKane08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/HuiTL07,
  author       = {Kai Lung Hui and
                  Hock{-}Hai Teo and
                  Sang{-}Yong Tom Lee},
  title        = {The Value of Privacy Assurance: An Exploratory Field Experiment},
  journal      = {{MIS} Q.},
  volume       = {31},
  number       = {1},
  pages        = {19--33},
  year         = {2007},
  url          = {http://misq.org/the-value-of-privacy-assurance-an-exploratory-field-experiment.html},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/misq/HuiTL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/RiceD07,
  author       = {Daniel Rice and
                  John D'Arcy},
  editor       = {John A. Hoxmeier and
                  Stephen C. Hayne},
  title        = {A Personal Information Auction: Measuring the Differential Value of
                  Privacy},
  booktitle    = {Reaching New Heights. 13th Americas Conference on Information Systems,
                  {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages        = {206},
  publisher    = {Association for Information Systems},
  year         = {2007},
  url          = {http://aisel.aisnet.org/amcis2007/206},
  timestamp    = {Thu, 26 Nov 2020 16:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/RiceD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijar/WangLHC06,
  author       = {Da{-}Wei Wang and
                  Churn{-}Jung Liau and
                  Tsan{-}sheng Hsu and
                  Jeremy K.{-}P. Chen},
  title        = {Value versus damage of information release: {A} data privacy perspective},
  journal      = {Int. J. Approx. Reason.},
  volume       = {43},
  number       = {2},
  pages        = {179--201},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ijar.2006.04.002},
  doi          = {10.1016/J.IJAR.2006.04.002},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijar/WangLHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/XuZHW06,
  author       = {Shuting Xu and
                  Jun Zhang and
                  Dianwei Han and
                  Jie Wang},
  title        = {Singular value decomposition based data distortion strategy for privacy
                  protection},
  journal      = {Knowl. Inf. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {383--397},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10115-006-0001-2},
  doi          = {10.1007/S10115-006-0001-2},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/XuZHW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieRO06,
  author       = {Yinglian Xie and
                  Michael K. Reiter and
                  David R. O'Hallaron},
  title        = {Protecting Privacy in Key-Value Search Systems},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {493--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.43},
  doi          = {10.1109/ACSAC.2006.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieRO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/SongHC06,
  author       = {Won Jay Song and
                  Im Sook H{\'{a}} and
                  Mun Kee Choi},
  editor       = {Laurence Tianruo Yang and
                  Hai Jin and
                  Jianhua Ma and
                  Theo Ungerer},
  title        = {System Architecture and Economic Value-Chain Models for Healthcare
                  Privacy and Security Control in Large-Scale Wireless Sensor Networks},
  booktitle    = {Autonomic and Trusted Computing, Third International Conference, {ATC}
                  2006, Wuhan, China, September 3-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4158},
  pages        = {511--520},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11839569\_50},
  doi          = {10.1007/11839569\_50},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/SongHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/FriedmanSKCS06,
  author       = {Batya Friedman and
                  Ian E. Smith and
                  Peter H. Kahn Jr. and
                  Sunny Consolvo and
                  Jaina Selawski},
  editor       = {Paul Dourish and
                  Adrian Friday},
  title        = {Development of a Privacy Addendum for Open Source Licenses: Value
                  Sensitive Design in Industry},
  booktitle    = {UbiComp 2006: Ubiquitous Computing, 8th International Conference,
                  UbiComp 2006, Orange County, CA, USA, September 17-21, 2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4206},
  pages        = {194--211},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11853565\_12},
  doi          = {10.1007/11853565\_12},
  timestamp    = {Sun, 02 Jun 2019 21:25:01 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/FriedmanSKCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/WangZZ06,
  author       = {Jie Wang and
                  Weijun Zhong and
                  Jun Zhang},
  title        = {NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection
                  on Non-negative-valued Datasets},
  booktitle    = {Workshops Proceedings of the 6th {IEEE} International Conference on
                  Data Mining {(ICDM} 2006), 18-22 December 2006, Hong Kong, China},
  pages        = {513--517},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDMW.2006.123},
  doi          = {10.1109/ICDMW.2006.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/WangZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/DuanC06,
  author       = {Yitao Duan and
                  John F. Canny},
  title        = {From Commodity to Value: {A} Privacy-Preserving e-Business Architecture},
  booktitle    = {2006 {IEEE} International Conference on e-Business Engineering {(ICEBE}
                  2006), 24-26 October 2006, Shanghai, China},
  pages        = {488--495},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICEBE.2006.53},
  doi          = {10.1109/ICEBE.2006.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/DuanC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicic/SaitoNS06,
  author       = {Mitsutoshi Saito and
                  Yusuke Namba and
                  Seiichi Serikawa},
  title        = {Extraction of the Value Representing Human Feature for the Development
                  of the Sensor with the Function of Privacy-Protection and the Construction
                  of Discrimination-Circuit},
  booktitle    = {First International Conference on Innovative Computing, Information
                  and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing,
                  China},
  pages        = {660--663},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICICIC.2006.274},
  doi          = {10.1109/ICICIC.2006.274},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icicic/SaitoNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CvrcekKMD06,
  author       = {Daniel Cvrcek and
                  Marek Kumpost and
                  Vashek Matyas and
                  George Danezis},
  editor       = {Ari Juels and
                  Marianne Winslett},
  title        = {A study on the value of location privacy},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179601.1179621},
  doi          = {10.1145/1179601.1179621},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/CvrcekKMD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HubermanAF05,
  author       = {Bernardo A. Huberman and
                  Eytan Adar and
                  Leslie R. Fine},
  title        = {Valuating Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {5},
  pages        = {22--25},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.137},
  doi          = {10.1109/MSP.2005.137},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HubermanAF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/EarpAAS05,
  author       = {Julia Brande Earp and
                  Annie I. Ant{\'{o}}n and
                  Lynda Aiman{-}Smith and
                  William H. Stufflebeam},
  title        = {Examining Internet privacy policies within the context of user privacy
                  values},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {52},
  number       = {2},
  pages        = {227--237},
  year         = {2005},
  url          = {https://doi.org/10.1109/TEM.2005.844927},
  doi          = {10.1109/TEM.2005.844927},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/EarpAAS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/MaheswaranPVBT05,
  author       = {Rajiv T. Maheswaran and
                  Jonathan P. Pearce and
                  Pradeep Varakantham and
                  Emma Bowring and
                  Milind Tambe},
  title        = {Valuations of Possible States {(VPS):} {A} Quantitative Framework
                  for Analysis of Privacy Loss Among Collaborative Personal Assistant
                  Agents},
  booktitle    = {Persistent Assistants: Living and Working with AI, Papers from the
                  2005 {AAAI} Spring Symposium, Technical Report SS-05-05, Stanford,
                  California, USA, March 21-23, 2005},
  pages        = {60--67},
  publisher    = {{AAAI}},
  year         = {2005},
  url          = {http://www.aaai.org/Library/Symposia/Spring/2005/ss05-05-011.php},
  timestamp    = {Sat, 18 Feb 2012 12:26:52 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/MaheswaranPVBT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MaheswaranPVBT05,
  author       = {Rajiv T. Maheswaran and
                  Jonathan P. Pearce and
                  Pradeep Varakantham and
                  Emma Bowring and
                  Milind Tambe},
  editor       = {Frank Dignum and
                  Virginia Dignum and
                  Sven Koenig and
                  Sarit Kraus and
                  Munindar P. Singh and
                  Michael J. Wooldridge},
  title        = {Valuations of Possible States {(VPS):} a quantitative framework for
                  analysis of privacy loss among collaborative personal assistant agents},
  booktitle    = {4th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2005), July 25-29, 2005, Utrecht, The Netherlands},
  pages        = {1030--1037},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1082473.1082629},
  doi          = {10.1145/1082473.1082629},
  timestamp    = {Fri, 26 Apr 2019 14:26:42 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/MaheswaranPVBT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/Otterloo05,
  author       = {Sieuwert van Otterloo},
  editor       = {Frank Dignum and
                  Virginia Dignum and
                  Sven Koenig and
                  Sarit Kraus and
                  Munindar P. Singh and
                  Michael J. Wooldridge},
  title        = {The value of privacy: optimal strategies for privacy minded agents},
  booktitle    = {4th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2005), July 25-29, 2005, Utrecht, The Netherlands},
  pages        = {1015--1022},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1082473.1082627},
  doi          = {10.1145/1082473.1082627},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/Otterloo05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/ChenLH05,
  author       = {Chun{-}Hua Chen and
                  Chi{-}Min Lan and
                  Gwoboa Horng},
  title        = {Protecting Customer's Privacy in Querying Valuable Information Combined
                  with E-Payment Scheme},
  booktitle    = {Third International Conference on Information Technology and Applications
                  {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages        = {580--583},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICITA.2005.222},
  doi          = {10.1109/ICITA.2005.222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icita/ChenLH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/HubermanAF05,
  author       = {Bernardo A. Huberman and
                  Eytan Adar and
                  Leslie R. Fine},
  title        = {Valuating Privacy},
  booktitle    = {4th Annual Workshop on the Economics of Information Security, {WEIS}
                  2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005},
  year         = {2005},
  url          = {http://infosecon.net/workshop/pdf/7.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/HubermanAF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Sand05,
  author       = {Peter E. Sand},
  title        = {The Privacy Value},
  booktitle    = {4th Annual Workshop on the Economics of Information Security, {WEIS}
                  2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005},
  year         = {2005},
  url          = {http://infosecon.net/workshop/pdf/privacy\_value.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/Sand05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/WathieuF05,
  author       = {Luc Wathieu and
                  Allan Friedman},
  title        = {An empirical approach to the valuing privacy valuation},
  booktitle    = {4th Annual Workshop on the Economics of Information Security, {WEIS}
                  2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005},
  year         = {2005},
  url          = {http://infosecon.net/workshop/pdf/WathFried\_WEIS05.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/WathieuF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VenkateshSRSS05,
  author       = {R. Venkatesh and
                  C. Sanjeevakumar and
                  M. Kasi Rajan and
                  L. Sudarsan and
                  N. Srinivasan},
  title        = {A {QKD} Protocol Extendable to Support Entanglement and Reduce Unauthorized
                  Information Gain by Randomizing the Bases Lists with Key Values and
                  Invalidate Explicit Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VenkateshSRSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChidaKM04,
  author       = {Koji Chida and
                  Kunio Kobayashi and
                  Hikaru Morita},
  title        = {An Auction Protocol Preserving Privacy of Losing Bids with a Secure
                  Value Comparison Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {173--181},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_173\&category=D\&year=2004\&lang=E\&abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChidaKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/EngbergHJ04,
  author       = {Stephan J. Engberg and
                  Morten Borup Harning and
                  Christian Damsgaard Jensen},
  title        = {Zero-knowledge Device Authentication: Privacy {\&} Security Enhanced
                  {RFID} preserving Business Value and Consumer Convenience},
  booktitle    = {Second Annual Conference on Privacy, Security and Trust, October 13-15,
                  2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick,
                  Canada, Proceedings},
  pages        = {89--101},
  year         = {2004},
  url          = {http://dev.hil.unb.ca/Texts/PST/pdf/engberg.pdf},
  timestamp    = {Tue, 07 Mar 2006 13:49:03 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/EngbergHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/EarpPB04,
  author       = {Julia Brande Earp and
                  J. C. Poindexter and
                  David L. Baumer},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Modeling privacy values with experimental economics},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029185},
  doi          = {10.1145/1029179.1029185},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/EarpPB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/ZakariaSS03,
  author       = {Norhayati Zakaria and
                  Jeffrey M. Stanton and
                  Shreya T. M. Sarkar{-}Barney},
  title        = {Designing and implementing culturally-sensitive {IT} applications:
                  The interaction of culture values and privacy issues in the Middle
                  East},
  journal      = {Inf. Technol. People},
  volume       = {16},
  number       = {1},
  pages        = {49--75},
  year         = {2003},
  url          = {https://doi.org/10.1108/09593840310463023},
  doi          = {10.1108/09593840310463023},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itp/ZakariaSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LichtensteinSB03,
  author       = {Sharman Lichtenstein and
                  Paula M. C. Swatman and
                  Kanchan Babu},
  title        = {Adding Value to Online Privacy for Consumers: Remedying Deficiences
                  in Online Privacy Policies with an Holistic Approac},
  booktitle    = {36th Hawaii International Conference on System Sciences {(HICSS-36}
                  2003), {CD-ROM} / Abstracts Proceedings, January 6-9, 2003, Big Island,
                  HI, {USA}},
  pages        = {206},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/HICSS.2003.1174470},
  doi          = {10.1109/HICSS.2003.1174470},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LichtensteinSB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CazierSL03,
  author       = {Joseph A. Cazier and
                  Benjamin B. M. Shao and
                  Robert St. Louis},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Addressing E-Business Privacy Concerns: The Roles of Trust and Value
                  Compatibility},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {617--622},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952654},
  doi          = {10.1145/952532.952654},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/CazierSL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jilt/KennyB02,
  author       = {Steve Kenny and
                  John J. Borking},
  title        = {The Value of Privacy Engineering},
  journal      = {J. Inf. Law Technol.},
  volume       = {2002},
  number       = {1},
  year         = {2002},
  url          = {http://elj.warwick.ac.uk/jilt/02-1/kenny.html},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jilt/KennyB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/DhillonBH02,
  author       = {Gurpreet Dhillon and
                  John Bardacino and
                  Raymond A. Hackney},
  editor       = {Francesc Miralles and
                  Josep Valor},
  title        = {Value Focused Assessment of Individual Privacy Concerns for Internet
                  Commerce},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2002, Barcelona, Spain, December 15-18, 2002},
  pages        = {67},
  publisher    = {Association for Information Systems},
  year         = {2002},
  url          = {http://aisel.aisnet.org/icis2002/67},
  timestamp    = {Mon, 21 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/DhillonBH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/AntonEAP01,
  author       = {Annie I. Ant{\'{o}}n and
                  Julia Brande Earp and
                  Thomas A. Alspaugh and
                  Colin Potts},
  title        = {The Role of Policy and Stakeholder Privacy Values in Requirements
                  Engineering},
  booktitle    = {5th {IEEE} International Symposium on Requirements Engineering {(RE}
                  2001), 27-31 August 2001, Toronto, Canada},
  pages        = {138--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ISRE.2001.948553},
  doi          = {10.1109/ISRE.2001.948553},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/AntonEAP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Poore00a,
  author       = {Ralph Spencer Poore},
  title        = {Privacy and the Value of Personal Data},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {9},
  number       = {3},
  pages        = {1--6},
  year         = {2000},
  url          = {https://doi.org/10.1201/1086/43310.9.3.20000708/31357.3},
  doi          = {10.1201/1086/43310.9.3.20000708/31357.3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Poore00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MilbergBSK95,
  author       = {Sandra J. Milberg and
                  Sandra J. Burke and
                  H. Jeff Smith and
                  Ernest A. Kallman},
  title        = {Values, Personal Information Privacy, and Regulatory Approaches},
  journal      = {Commun. {ACM}},
  volume       = {38},
  number       = {12},
  pages        = {65--74},
  year         = {1995},
  url          = {https://doi.org/10.1145/219663.219683},
  doi          = {10.1145/219663.219683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MilbergBSK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Swaay95,
  author       = {Maarten van Swaay},
  title        = {The value and protection of privacy},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {26},
  number       = {Supplement-4},
  pages        = {S149--S155},
  year         = {1995},
  url          = {https://doi.org/10.1016/0169-7552(95)90002-0},
  doi          = {10.1016/0169-7552(95)90002-0},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Swaay95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics