Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Schnell, R. (2015)
Publisher: John Wiley & Sons
Languages: English
Types: Part of book or chapter of book
Subjects: QA75
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Alaggan, Mohammad, Sebastien Gambs & Anne-Marie Kermarrec, 2012: BLIP: Noninteractive Di erentially-Private Similarity Computation on Bloom Filters. in: Andrea W. Richa & Christian Scheideler (Hg.), Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, 2012, Toronto, Canada, October 1{4, 2012. Proceedings, S. 202{216. Berlin: Springer.
    • Broder , Andrei Z., 1997: On the Resemblance and Containment of Documents. in: Proceedings of Compression and Complexity of Sequences, Positano, Italy., S. 21{29. Washington: Institute of Electrical and Electronics Engineers.
    • Chen, Bee-Chung, Daniel Kifer, Kristen LeFevre & Ashwin Machanavajjhala, 2009: Privacy-Preserving Data Publishing. Foundations and Trends in Databases, Vol 2. Hanover: now Publishers.
    • Christen, Peter, 2008: Febrl: an open source data cleaning, deduplication and record linkage system with a graphical user interface. in: Ying Li, Bing Liu & Sunita Sarawagi (Hg.), Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, S. 1065{1068. o. O.: ACM.
    • Christen, Peter, 2012a: Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-Centric Systems and Applications. Berlin: Springer.
    • Christen, Peter, Vassilios Verykios & Dinusha Vatsalan, 2013: A Tutorial on Techniques for Scalable Privacy-preserving Record Linkage. http://cs.anu.edu.au/ Peter.Christen/cikm2013pprl-tutorial/cikm-2013-pprl-tutorialslides.pdf.
    • Dalenius, T., 1977: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15 (429-444): 2{1.
    • Durham, Elizabeth Ashley, 2012: A Framework for Accurate, E cient Private Record Linkage. Dissertation, Nashville: Vanderbilt University.
    • Fox , W. R. & G. W. Lasker, 1983: The Distribution of Surname Frequencies. International Statistical Review 51 (1): 81{87.
    • Ganta, Srivatsava Ranjit, Shiva Prasad Kasiviswanathan & Adam Smith, 2008: Composition attacks and auxiliary information in data privacy. in: Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, S. 265{273. o. O.: ACM.
    • Grannis, Shaun J, J Marc Overhage & Clement J McDonald, 2002: Analysis of identi er performance using a deterministic linkage algorithm. in: Proceedings of the AMIA Symposium, S. 305{309. o. O.: American Medical Informatics Association.
    • Hall , Rob & Stephen E. Fienberg, 2010: Privacy-Preserving Record Linkage. S. 269{ 283 in: Josep Domingo-Ferrer & Emmanouil Magkos (Hg.), Privacy in Statistical Databases. Lecture Notes in Computer Science, Nr. 6344. o. O.: Springer Berlin Heidelberg.
    • Haupt , Randy L. & Sue Ellen Haupt, 2004: Practical genetic algorithms. Hoboken: Wiley.
    • Karakasidis, A. & V. S. Verykios, 2009: Privacy Preserving Record Linkage Using Phonetic Codes. in: Informatics, 2009. BCI '09. Fourth Balkan Conference in, S. 101{106.
    • Karakasidis, A & V.S. Verykios, 2012a: A Sorted Neighborhood Approach to Multidimensional Privacy Preserving Blocking. in: 2012 IEEE 12th International Conference on Data Mining Workshops (ICDMW), S. 937{944.
    • Karakasidis, A., V. S. Verykios & P. Christen, 2012: Fake Injection Strategies for Private Phonetic Matching. S. 9{24 in: J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia & S. de Capitani di Vimercati (Hg.), Data Privacy Management and Autonomous Spontaneus Security. Lecture Notes in Computer Science. Bd. 7122. Berlin: Springer.
    • Karakasidis, Alexandros & Vassilios S Verykios, 2011: Secure Blocking + Secure Matching= Secure Record Linkage. Journal of Computing Science and Engineering 5 (3): 223{235.
    • Karakasidis, Alexandros & Vassilios S. Verykios, 2012b: Reference Table Based kanonymous Private Blocking. in: Proceedings of the 27th Annual ACM Symposium on Applied Computing, S. 859{864. o. O.: ACM.
    • Karapiperis, Dimitrios & Vassilios S. Verykios, 2014: A distributed near-optimal LSHbased framework for privacy-preserving record linkage. Computer Science and Information Systems 11 (2): 745{763.
    • Kelsey, John, Bruce Schneier, Chris Hall & David Wagner, 1998: Secure applications of low-entropy keys. S. 121{134 in: Eiji Okamoto, George Davida & Masahiro Mambo (Hg.), Information Security. o. O.: Springer.
    • Kirsch, Adam & Michael Mitzenmacher, 2006: Less Hashing, Same Performance: Building a Better Bloom Filter. in: Yossi Azar & Thomas Erlebach (Hg.), Proceedings of the 14th Annual European Symposium on Algorithms, Zurich, Switzerland, September 11{13, S. 456{467. Springer: Heidelberg.
    • Kolb, Lars, Andreas Thor & Erhard Rahm, 2012: Multi-pass Sorted Neighborhood Blocking with MapReduce. Computer Science - Research and Development 27 (1): 45{63. http://dx.doi.org/10.1007/s00450-011-0177-x.
    • Kuzu, Mehmet, Murat Kantarcioglu, Elizabeth Durham & Bradley Malin, 2011: A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage. in: S. Fischer-Hubner & N. Hopper (Hg.), The 11th Privacy Enhancing Technologies Symposium, S. 226{245. Berlin: Springer.
    • Kuzu, Mehmet, Murat Kantarcioglu, Elizabeth Ashley Durham, Csaba Toth & Bradley Malin, 2013: A Practical Approach to Achieve Private Medical Record Linkage in Light of Public Resources. Journal of the American Medical Informatics Association 20 (2): 285{292.
    • Leskovec, Jure, Anand Rajaraman & Je rey D. Ullman, 2014: Datasets. www.mmds.org.
    • O ce for National Statistics, 2013: Beyond 2011: Matching Anonymous Data. Methods & Policies M9, ONS, London.
    • Ohm, Paul, 2010: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57: 1701{1777.
    • Ong , Toan C, Michael V Mannino, Lisa M Schilling & Michael G Kahn, 2014: Improving Record Linkage Performance in the Presence of Missing Linkage Data. Journal of biomedical informatics S. preprint.
    • Pang , Chaoyi & David Hansen, 2006: Improved Record Linkage for Encrypted Identifying Data. in: Johanna Westbrook, J. Callen, G. Margelis & J. Warren (Hg.), HIC 2006 and HINZ 2006: Proceedings, S. 164{168. Brunswick East, Vic.: Health Informatics Society of Australia.
    • of the Ninth Australasian Data Mining Conference-Volume 121, S. 125{136. o. O.: Australian Computer Society.
    • Vatsalan, Dinusha, Peter Christen & Vassilios S Verykios, 2013: E cient two-party private blocking based on sorted nearest neighborhood clustering. in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management, S. 1949{1958. o. O.: ACM.
    • Vatsalan, Dinusha, Peter Christen, Christine O'Keefe & Vassilios S. Verykios, 2014: An Evaluation Framework for Privacy-preserving Record Linkage. Journal of Privacy and Con dentiality 6 (1): 35{75.
    • Verykios, Vassilios S. & Peter Christen, 2013: Privacy-preserving Record Linkage. WIREs Data Mining and Knowledge Discovery, (3): 321{332.
    • Winkler , William E., 2009: Record Linkage. S. 351{380 in: Danny Pfe ermann & C.R. Rao (Hg.), Handbook of Statistics Vol. 29A, Sample Surveys: Design, Methods and Applications. Amsterdam: Elsevier, North-Holland.
    • Wong, Kok-Seng & Myung Ho Kim, 2013: Privacy-preserving similarity coe cients for binary data. Computers & Mathematics with Applications 65 (9): 1280{1290.
    • Yakout, Mohamed, Mikhail J. Atallah & Ahmed Elmagarmid, 2009: E cient Private Record Linkage. in: Proceedings of the 25th International Conference on Data Engineering, S. 1283{1286. o. O.: IEEE.
    • Zhang, Bo & Fangguo Zhang, 2012: Secure similarity coe cients computation with malicious adversaries. in: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on, S. 303{310. o. O.: IEEE.
    • Zingmond , David S, Zhishen Ye, Susan L Ettner & Honghu Liu, 2004: Linking hospital discharge and death records { accuracy and sources of bias. Journal of Clinical Epidemiology 57 (1): 21{29.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article