Search dblp for Publications

export results for "stream:journals/jpc:"

 download as .bib file

@article{DBLP:journals/jpc/BenedettoT23,
  author       = {Gary Benedetto and
                  Evan Totty},
  title        = {Synthesizing Familial Linkages for Privacy in Microdata},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.767},
  doi          = {10.29012/JPC.767},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/BenedettoT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CummingsKR23,
  author       = {Rachel Cummings and
                  Gabriel Kaptchuk and
                  Elissa M. Redmiles},
  title        = {"I need a better description": An Investigation Into User Expectations
                  For Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.813},
  doi          = {10.29012/JPC.813},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/CummingsKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/EtzKP23,
  author       = {Kathy Etz and
                  Heather Kimmel and
                  Amy Pienta},
  title        = {National Addiction and {HIV} Data Archive Program: Developing an Approach
                  for Reuse of Sensitive and Confidential Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.853},
  doi          = {10.29012/JPC.853},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/EtzKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GreenR23,
  author       = {Elizabeth Green and
                  Felix Ritchie},
  title        = {The present and future of the Five Safes framework},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.831},
  doi          = {10.29012/JPC.831},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/GreenR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GreenR23a,
  author       = {Elizabeth Green and
                  Felix Ritchie},
  title        = {Using pedagogical and psychological insights to train analysts using
                  confidential data},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.842},
  doi          = {10.29012/JPC.842},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/GreenR23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/JahanaraACRS23,
  author       = {MohammadMahdi Jahanara and
                  Vahid R. Asadi and
                  Marco Carmosino and
                  Akbar Rafiey and
                  Bahar Salamatian},
  title        = {Private Boosted Decision Trees via Smooth Re-Weighting},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.808},
  doi          = {10.29012/JPC.808},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/JahanaraACRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/JangPLS23,
  author       = {Joy Bohyun Jang and
                  Amy M. Pienta and
                  Margaret Levenstein and
                  Joe Saul},
  title        = {Restricted data management: the current practice and the future},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.844},
  doi          = {10.29012/JPC.844},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/JangPLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KarcherSW23,
  author       = {Sebastian Karcher and
                  Sefa Secen and
                  Nicholas Weber},
  title        = {Protecting Sensitive Data Early in the Research Data Lifecycle},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.846},
  doi          = {10.29012/JPC.846},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KarcherSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/MarcotteRO23,
  author       = {John E. Marcotte and
                  Sarah Rush and
                  Kelly Ogden{-}Schuette},
  title        = {Tiered Access to Research Data for Secondary Analysis},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.825},
  doi          = {10.29012/JPC.825},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/MarcotteRO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/McKennaMHM23,
  author       = {Ryan McKenna and
                  Gerome Miklau and
                  Michael Hay and
                  Ashwin Machanavajjhala},
  title        = {Optimizing Error of High-Dimensional Statistical Queries Under Differential
                  Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.791},
  doi          = {10.29012/JPC.791},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/McKennaMHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/PientaJL23,
  author       = {Amy M. Pienta and
                  Joy Jang and
                  Margaret Levenstein},
  title        = {Beyond Legal Frameworks and Security Controls For Accessing Confidential
                  Survey Data: Engaging Data Users in Data Protection},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.845},
  doi          = {10.29012/JPC.845},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/PientaJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BudiuTGWZ22,
  author       = {Mihai Budiu and
                  Pratiksha Thaker and
                  Parikshit Gopalan and
                  Udi Wieder and
                  Matei Zaharia},
  title        = {Overlook: Differentially Private Exploratory Visualization for Big
                  Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.779},
  doi          = {10.29012/JPC.779},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/BudiuTGWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CanonneKS22,
  author       = {Cl{\'{e}}ment L. Canonne and
                  Gautam Kamath and
                  Thomas Steinke},
  title        = {Discrete Gaussian for Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.784},
  doi          = {10.29012/JPC.784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/CanonneKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Gong22,
  author       = {Ruobin Gong},
  title        = {Exact Inference with Approximate Computation for Differentially Private
                  Data via Perturbations},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.797},
  doi          = {10.29012/JPC.797},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Gong22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/HehirSN22,
  author       = {Jonathan Hehir and
                  Aleksandra B. Slavkovic and
                  Xiaoyue Niu},
  title        = {Consistent Spectral Clustering of Network Block Models under Local
                  Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.811},
  doi          = {10.29012/JPC.811},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/HehirSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KaissisKJZUR22,
  author       = {Georgios Kaissis and
                  Moritz Knolle and
                  Friederike Jungmann and
                  Alexander Ziller and
                  Dmitrii Usynin and
                  Daniel Rueckert},
  title        = {Unified Interpretation of the Gaussian Mechanism for Differential
                  Privacy Through the Sensitivity Index},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.807},
  doi          = {10.29012/JPC.807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/KaissisKJZUR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LebedaAP22,
  author       = {Christian Janos Lebeda and
                  Martin Aum{\"{u}}ller and
                  Rasmus Pagh},
  title        = {Representing Sparse Vectors with Differential Privacy, Low Error,
                  Optimal Space, and Fast Access},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.809},
  doi          = {10.29012/JPC.809},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LebedaAP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NissimY22,
  author       = {Kobbi Nissim and
                  Chao Yan},
  title        = {The Sample Complexity of Distribution-Free Parity Learning in the
                  Robust Shuffle Model},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.805},
  doi          = {10.29012/JPC.805},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/NissimY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NixonBRS22,
  author       = {Michelle Nixon and
                  Andr{\'{e}}s F. Barrientos and
                  Jerome P. Reiter and
                  Aleksandra B. Slavkovic},
  title        = {A Latent Class Modeling Approach for Differentially Private Synthetic
                  Data for Contingency Tables},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.768},
  doi          = {10.29012/JPC.768},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/NixonBRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/VidanageRCS22,
  author       = {Anushka Vidanage and
                  Thilina Ranbaduge and
                  Peter Christen and
                  Rainer Schnell},
  title        = {Taxonomy of Attacks on Privacy-Preserving Record Linkage},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.764},
  doi          = {10.29012/JPC.764},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/VidanageRCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BaoXZZD21,
  author       = {Ergute Bao and
                  Xiaokui Xiao and
                  Jun Zhao and
                  Dongping Zhang and
                  Bolin Ding},
  title        = {Synthetic Data Generation with Differential Privacy via Bayesian Networks},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.776},
  doi          = {10.29012/JPC.776},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BaoXZZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BowenS21,
  author       = {Claire McKay Bowen and
                  Joshua Snoke},
  title        = {Comparative Study of Differentially Private Synthetic Data Algorithms
                  from the {NIST} {PSCR} Differential Privacy Synthetic Data Challenge},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.748},
  doi          = {10.29012/JPC.748},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BowenS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CheuSU21,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  title        = {Manipulation Attacks in Local Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.754},
  doi          = {10.29012/JPC.754},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/CheuSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DaganF21,
  author       = {Yuval Dagan and
                  Vitaly Feldman},
  title        = {Interaction is Necessary for Distributed Learning with Privacy or
                  Communication Constraints},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.781},
  doi          = {10.29012/JPC.781},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/DaganF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkSZ21,
  author       = {Cynthia Dwork and
                  Weijie J. Su and
                  Li Zhang},
  title        = {Differentially private false discovery rate control},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.755},
  doi          = {10.29012/JPC.755},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GopiGKSSY21,
  author       = {Sivakanth Gopi and
                  Pankaj Gulhane and
                  Janardhan Kulkarni and
                  Judy Hanwen Shen and
                  Milad Shokouhi and
                  Sergey Yekhanin},
  title        = {Differentially Private Set Union},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.780},
  doi          = {10.29012/JPC.780},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/GopiGKSSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Harvey21,
  author       = {Michael Harvey},
  title        = {Research Data Centres - a Regulator's Perspective},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.769},
  doi          = {10.29012/JPC.769},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Harvey21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Jarmin21,
  author       = {Ron S. Jarmin},
  title        = {Reflections on the Successes and Challenges of Research Data Centers
                  in Canada and the {U.S}},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.765},
  doi          = {10.29012/JPC.765},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Jarmin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/McKennaMS21,
  author       = {Ryan McKenna and
                  Gerome Miklau and
                  Daniel Sheldon},
  title        = {Winning the {NIST} Contest: {A} scalable and general approach to differentially
                  private synthetic data},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.778},
  doi          = {10.29012/JPC.778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/McKennaMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Ritchie21,
  author       = {Felix Ritchie},
  title        = {Microdata access and privacy: What have we learned over twenty years?},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.766},
  doi          = {10.29012/JPC.766},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Ritchie21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/RogersSPDLKSA21,
  author       = {Ryan Rogers and
                  Subbu Subramaniam and
                  Sean Peng and
                  David Durfee and
                  Seunghyun Lee and
                  Santosh Kumar Kancha and
                  Shraddha Sahay and
                  Parvez Ahammad},
  title        = {LinkedIn's Audience Engagements {API:} {A} Privacy Preserving Data
                  Analytics System at Scale},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.782},
  doi          = {10.29012/JPC.782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/RogersSPDLKSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/SealfonU21,
  author       = {Adam Sealfon and
                  Jonathan R. Ullman},
  title        = {Efficiently Estimating Erdos-Renyi Graphs with Node Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.745},
  doi          = {10.29012/JPC.745},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/SealfonU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Silberman21,
  author       = {Roxane Silberman},
  title        = {Developing access to confidential data in France: results and new
                  challenges},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.788},
  doi          = {10.29012/JPC.788},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Silberman21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Vilhuber21,
  author       = {Lars Vilhuber},
  title        = {Expansion, perspectives, and challenges},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.777},
  doi          = {10.29012/JPC.777},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Vilhuber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Vilhuber21a,
  author       = {Lars Vilhuber},
  title        = {Editorial: Articles, perspectives, and {TPDP}},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.801},
  doi          = {10.29012/JPC.801},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Vilhuber21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WangLZ21,
  author       = {Tianhao Wang and
                  Ninghui Li and
                  Zhikun Zhang},
  title        = {DPSyn: Experiences in the {NIST} Differential Privacy Data Synthesis
                  Challenges},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.775},
  doi          = {10.29012/JPC.775},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WangLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AcharyaKSZ20,
  author       = {Jayadev Acharya and
                  Gautam Kamath and
                  Ziteng Sun and
                  Huanyu Zhang},
  title        = {{INSPECTRE:} Privately Estimating the Unseen},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.724},
  doi          = {10.29012/JPC.724},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AcharyaKSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AsgharDRMK20,
  author       = {Hassan Jameel Asghar and
                  Ming Ding and
                  Thierry Rakotoarivelo and
                  Sirine Mrabet and
                  Dali Kaafar},
  title        = {Differentially Private Release of Datasets using Gaussian Copula},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.686},
  doi          = {10.29012/JPC.686},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AsgharDRMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AwanS20,
  author       = {Jordan Awan and
                  Aleksandra B. Slavkovic},
  title        = {Differentially Private Inference for Binomial Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.725},
  doi          = {10.29012/JPC.725},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AwanS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BalleBG20,
  author       = {Borja Balle and
                  Gilles Barthe and
                  Marco Gaboardi},
  title        = {Privacy Profiles and Amplification by Subsampling},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.726},
  doi          = {10.29012/JPC.726},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BalleBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BittnerBGRSW20,
  author       = {Daniel M. Bittner and
                  Alejandro E. Brito and
                  Mohsen Ghassemi and
                  Shantanu Rane and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  title        = {Understanding Privacy-Utility Tradeoffs in Differentially Private
                  Online Active Learning},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.720},
  doi          = {10.29012/JPC.720},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BittnerBGRSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ChienWM20,
  author       = {Chien{-}Hung Chien and
                  Alan H. Welsh and
                  John D. Moore},
  title        = {Synthetic Business Microdata - an Australian example},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.733},
  doi          = {10.29012/JPC.733},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/ChienWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CohenN20,
  author       = {Aloni Cohen and
                  Kobbi Nissim},
  title        = {Linear Program Reconstruction in Practice},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.711},
  doi          = {10.29012/JPC.711},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/CohenN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DingMW20,
  author       = {Aidong Adam Ding and
                  Guanhong Miao and
                  Samuel Shangwu Wu},
  title        = {On the Privacy and Utility Properties of Triple Matrix-Masking},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.674},
  doi          = {10.29012/JPC.674},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DingMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkKNV20,
  author       = {Cynthia Dwork and
                  Alan F. Karr and
                  Kobbi Nissim and
                  Lars Vilhuber},
  title        = {On Privacy in the Age of {COVID-19}},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.749},
  doi          = {10.29012/JPC.749},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkKNV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/HolohanABA20,
  author       = {Naoise Holohan and
                  Spiros Antonatos and
                  Stefano Braghin and
                  P{\'{o}}l Mac Aonghusa},
  title        = {The Bounded Laplace Mechanism in Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.715},
  doi          = {10.29012/JPC.715},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/HolohanABA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/JosephRUW20,
  author       = {Matthew Joseph and
                  Aaron Roth and
                  Jonathan R. Ullman and
                  Bo Waggoner},
  title        = {Local Differential Privacy for Evolving Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.718},
  doi          = {10.29012/JPC.718},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/JosephRUW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NikolovV20,
  author       = {Aleksandar Nikolov and
                  Lars Vilhuber},
  title        = {Editorial for Special Issue on the Theory and Practice of Differential
                  Privacy 2018},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.736},
  doi          = {10.29012/JPC.736},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/NikolovV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NikolovV20a,
  author       = {Aleksandar Nikolov and
                  Lars Vilhuber},
  title        = {Program for {TPDP} 2018},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.697},
  doi          = {10.29012/JPC.697},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/NikolovV20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WangBK20,
  author       = {Yu{-}Xiang Wang and
                  Borja Balle and
                  Shiva Prasad Kasiviswanathan},
  title        = {Subsampled R{\'{e}}nyi Differential Privacy and Analytical Moments
                  Accountant},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.723},
  doi          = {10.29012/JPC.723},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/WangBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AventKZHL19,
  author       = {Brendan Avent and
                  Aleksandra Korolova and
                  David Zeber and
                  Torgeir Hovden and
                  Benjamin Livshits},
  title        = {{BLENDER:} Enabling Local Search with a Hybrid Differential Privacy
                  Model},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.680},
  doi          = {10.29012/JPC.680},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AventKZHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BalcerV19,
  author       = {Victor Balcer and
                  Salil P. Vadhan},
  title        = {Differential Privacy on Finite Computers},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.679},
  doi          = {10.29012/JPC.679},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BalcerV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BartheDGHRS19,
  author       = {Gilles Barthe and
                  Christos Dimitrakakis and
                  Marco Gaboardi and
                  Andreas Haeberlen and
                  Aaron Roth and
                  Aleksandra B. Slavkovic},
  title        = {Program for {TPDP} 2016},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.699},
  doi          = {10.29012/JPC.699},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BartheDGHRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BunSU19,
  author       = {Mark Bun and
                  Thomas Steinke and
                  Jonathan R. Ullman},
  title        = {Make Up Your Mind: The Price of Online Queries in Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.655},
  doi          = {10.29012/JPC.655},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/BunSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ChettyF19,
  author       = {Raj Chetty and
                  John N Friedman},
  title        = {A Practical Method to Reduce Privacy Loss When Disclosing Statistics
                  Based on Small Samples},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.716},
  doi          = {10.29012/JPC.716},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/ChettyF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkKM19,
  author       = {Cynthia Dwork and
                  Nitin Kohli and
                  Deirdre K. Mulligan},
  title        = {Differential Privacy in Practice: Expose your Epsilons!},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.689},
  doi          = {10.29012/JPC.689},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/FooteMM19,
  author       = {Andrew David Foote and
                  Ashwin Machanavajjhala and
                  Kevin McKinney},
  title        = {Releasing Earnings Distributions using Differential Privacy - Disclosure
                  Avoidance System For Post-Secondary Employment Outcomes {(PSEO)}},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.722},
  doi          = {10.29012/JPC.722},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/FooteMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Gaboardi19,
  author       = {Marco Gaboardi},
  title        = {Special Issue on the Theory and Practice of Differential Privacy 2016},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.717},
  doi          = {10.29012/JPC.717},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Gaboardi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Sheffet19,
  author       = {Or Sheffet},
  title        = {Differentially Private Ordinary Least Squares},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.654},
  doi          = {10.29012/JPC.654},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Sheffet19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/StemmerN19,
  author       = {Uri Stemmer and
                  Kobbi Nissim},
  title        = {Concentration Bounds for High Sensitivity Functions Through Differential
                  Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.658},
  doi          = {10.29012/JPC.658},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/StemmerN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/UllmanV19,
  author       = {Jonathan R. Ullman and
                  Lars Vilhuber},
  title        = {Editorial for Volume 9 Issue 2},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.731},
  doi          = {10.29012/JPC.731},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/UllmanV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/UllmanV19a,
  author       = {Jonathan R. Ullman and
                  Lars Vilhuber},
  title        = {Program for {TPDP} 2017},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.698},
  doi          = {10.29012/JPC.698},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/UllmanV19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Wang19,
  author       = {Yu{-}Xiang Wang},
  title        = {Per-instance Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.662},
  doi          = {10.29012/JPC.662},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Wang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WangKL19,
  author       = {Yue Wang and
                  Daniel Kifer and
                  Jaewoo Lee},
  title        = {Differentially Private Confidence Intervals for Empirical Risk Minimization},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.660},
  doi          = {10.29012/JPC.660},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WangKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WuRLWN19,
  author       = {Zhiwei Steven Wu and
                  Aaron Roth and
                  Katrina Ligett and
                  Bo Waggoner and
                  Seth Neel},
  title        = {Accuracy First: Selecting a Differential Privacy Level for Accuracy-Constrained
                  {ERM}},
  journal      = {J. Priv. Confidentiality},
  volume       = {9},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.29012/jpc.682},
  doi          = {10.29012/JPC.682},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/WuRLWN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Abowd18,
  author       = {John M. Abowd},
  title        = {Tribute to Steve Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.707},
  doi          = {10.29012/JPC.707},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Abowd18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AmitaiR18,
  author       = {Gilad Amitai and
                  Jerome P. Reiter},
  title        = {Differentially private posterior summaries for linear regression coefficients},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.683},
  doi          = {10.29012/JPC.683},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AmitaiR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Dwork18,
  author       = {Cynthia Dwork},
  title        = {The Future of the Journal of Privacy and Confidentiality},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.708},
  doi          = {10.29012/JPC.708},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Dwork18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Dwork18a,
  author       = {Cynthia Dwork},
  title        = {Reminiscences},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.702},
  doi          = {10.29012/JPC.702},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Dwork18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkU18,
  author       = {Cynthia Dwork and
                  Jonathan R. Ullman},
  title        = {The Fienberg Problem: How to Allow Human Interactive Data Analysis
                  in the Age of Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.687},
  doi          = {10.29012/JPC.687},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Karr18,
  author       = {Alan F. Karr},
  title        = {Reminiscences of Steve Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.691},
  doi          = {10.29012/JPC.691},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Karr18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Karwa18,
  author       = {Vishesh Karwa},
  title        = {Steve's influence on my work},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.704},
  doi          = {10.29012/JPC.704},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Karwa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kifer18,
  author       = {Dan Kifer},
  title        = {Reminiscenses of Steve Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.705},
  doi          = {10.29012/JPC.705},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Kifer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KinneyK18,
  author       = {Saki Kinney and
                  Alan F. Karr},
  title        = {Public-Use vs. Restricted-Use: An Analysis Using the American Community
                  Survey},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.661},
  doi          = {10.29012/JPC.661},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/KinneyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LiKSS18,
  author       = {Bai Li and
                  Vishesh Karwa and
                  Aleksandra B. Slavkovic and
                  Rebecca Carter Steorts},
  title        = {A Privacy Preserving Algorithm to Release Sparse High-dimensional
                  Histograms},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.657},
  doi          = {10.29012/JPC.657},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/LiKSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Reiter18,
  author       = {Jerome P. Reiter},
  title        = {Reminiscences of Steve Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.692},
  doi          = {10.29012/JPC.692},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Reiter18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Shlomo18,
  author       = {Natalie Shlomo},
  title        = {Statistical Disclosure Limitation: New Directions and Challenges},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.684},
  doi          = {10.29012/JPC.684},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Shlomo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Shlomo18a,
  author       = {Natalie Shlomo},
  title        = {In Honour of Steve and Joyce Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.695},
  doi          = {10.29012/JPC.695},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Shlomo18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/SlavkovicV18,
  author       = {Aleksandra B. Slavkovic and
                  Lars Vilhuber},
  title        = {Remembering Stephen Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.685},
  doi          = {10.29012/JPC.685},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/SlavkovicV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Smith18,
  author       = {Adam Smith},
  title        = {Reminiscences about Steve Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.696},
  doi          = {10.29012/JPC.696},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Smith18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Steorts18,
  author       = {Rebecca Carter Steorts},
  title        = {Memories of Steve Fienberg},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.709},
  doi          = {10.29012/JPC.709},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Steorts18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Ventura18,
  author       = {Samuel L. Ventura},
  title        = {Steve Fienberg and Student Research},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.693},
  doi          = {10.29012/JPC.693},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Ventura18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Vilhuber18,
  author       = {Lars Vilhuber},
  title        = {Relaunching the Journal of Privacy and Confidentiality},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.706},
  doi          = {10.29012/JPC.706},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Vilhuber18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WangKLK18,
  author       = {Yue Wang and
                  Daniel Kifer and
                  Jaewoo Lee and
                  Vishesh Karwa},
  title        = {Statistical Approximating Distributions Under Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {8},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.29012/jpc.666},
  doi          = {10.29012/JPC.666},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/WangKLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Abowd16,
  author       = {John M. Abowd},
  title        = {How Will Statistical Agencies Operate When All Data Are Private?},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {3},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i3.404},
  doi          = {10.29012/JPC.V7I3.404},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Abowd16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AlagganGK16,
  author       = {Mohammad Alaggan and
                  S{\'{e}}bastien Gambs and
                  Anne{-}Marie Kermarrec},
  title        = {Heterogeneous Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.652},
  doi          = {10.29012/JPC.V7I2.652},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AlagganGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BackesKMMM16,
  author       = {Michael Backes and
                  Aniket Kate and
                  Praveen Manoharan and
                  Sebastian Meiser and
                  Esfandiar Mohammadi},
  title        = {AnoA: {A} Framework for Analyzing Anonymous Communication Protocols},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.651},
  doi          = {10.29012/JPC.V7I2.651},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/BackesKMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CharestH16,
  author       = {Anne{-}Sophie Charest and
                  Yiwei Hou},
  title        = {On the Meaning and Limits of Empirical Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {3},
  pages        = {53--66},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i3.406},
  doi          = {10.29012/JPC.V7I3.406},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/CharestH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkMNS16,
  author       = {Cynthia Dwork and
                  Frank McSherry and
                  Kobbi Nissim and
                  Adam D. Smith},
  title        = {Calibrating Noise to Sensitivity in Private Data Analysis},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {3},
  pages        = {17--51},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i3.405},
  doi          = {10.29012/JPC.V7I3.405},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkMNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/EbadiS16,
  author       = {Hamid Ebadi and
                  David Sands},
  title        = {Featherweight {PINQ}},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.653},
  doi          = {10.29012/JPC.V7I2.653},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/EbadiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GaboardiAHRW16,
  author       = {Marco Gaboardi and
                  Emilio Jes{\'{u}}s Gallego Arias and
                  Justin Hsu and
                  Aaron Roth and
                  Zhiwei Steven Wu},
  title        = {Dual Query: Practical Private Query Release for High Dimensional Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.650},
  doi          = {10.29012/JPC.V7I2.650},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/GaboardiAHRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GaboardiS16,
  author       = {Marco Gaboardi and
                  Chris J. Skinner},
  title        = {Special Issue on the Theory and Practice of Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.647},
  doi          = {10.29012/JPC.V7I2.647},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/GaboardiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KoufogiannisHP16,
  author       = {Fragkiskos Koufogiannis and
                  Shuo Han and
                  George J. Pappas},
  title        = {Gradual Release of Sensitive Data under Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.649},
  doi          = {10.29012/JPC.V7I2.649},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KoufogiannisHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/RaabND16,
  author       = {Gillian M. Raab and
                  Beata Nowok and
                  Chris Dibben},
  title        = {Practical Data Synthesis for Large Samples},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {3},
  pages        = {67--97},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i3.407},
  doi          = {10.29012/JPC.V7I3.407},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/RaabND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/SteinkeU16,
  author       = {Thomas Steinke and
                  Jonathan R. Ullman},
  title        = {Between Pure and Approximate Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.648},
  doi          = {10.29012/JPC.V7I2.648},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/SteinkeU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WuCBZ16,
  author       = {Samuel S. Wu and
                  Shigang Chen and
                  Deborah L Burr and
                  Long Zhang},
  title        = {A New Data Collection Technique for Preserving Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {3},
  pages        = {99--129},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i3.408},
  doi          = {10.29012/JPC.V7I3.408},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WuCBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg15,
  author       = {Stephen E. Fienberg},
  title        = {In This Issue},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {https://doi.org/10.29012/jpc.v7i1.642},
  doi          = {10.29012/JPC.V7I1.642},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/HuangSS15,
  author       = {Chong Huang and
                  Lalitha Sankar and
                  Anand D. Sarwate},
  title        = {Designing Incentive Schemes for Privacy-Sensitive Users},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {https://doi.org/10.29012/jpc.v7i1.646},
  doi          = {10.29012/JPC.V7I1.646},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/HuangSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kim15,
  author       = {Nicolas Kim},
  title        = {The Effect of Data Swapping on Analyses of American Community Survey
                  Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {https://doi.org/10.29012/jpc.v7i1.644},
  doi          = {10.29012/JPC.V7I1.644},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Kim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KleinS15,
  author       = {Martin Klein and
                  Bimal Sinha},
  title        = {Likelihood Based Finite Sample Inference for Singly Imputed Synthetic
                  Data Under the Multivariate Normal and Multiple Linear Regression
                  Models},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {https://doi.org/10.29012/jpc.v7i1.645},
  doi          = {10.29012/JPC.V7I1.645},
  timestamp    = {Thu, 10 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/KleinS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Murray15,
  author       = {Jared S. Murray},
  title        = {Probabilistic Record Linkage and Deduplication after Indexing, Blocking,
                  and Filtering},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {https://doi.org/10.29012/jpc.v7i1.643},
  doi          = {10.29012/JPC.V7I1.643},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Murray15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AcquistiGS14,
  author       = {Alessandro Acquisti and
                  Ralph Gross and
                  Fred Stutzman},
  title        = {Face Recognition and Privacy in the Age of Augmented Reality},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i2.638},
  doi          = {10.29012/JPC.V6I2.638},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AcquistiGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CrimiE14,
  author       = {Nicole Crimi and
                  William F. Eddy},
  title        = {Top-Coding and Public Use Microdata Samples from the {U.S.} Census
                  Bureau},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i2.639},
  doi          = {10.29012/JPC.V6I2.639},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/CrimiE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kasiviswanathan14,
  author       = {Shiva Prasad Kasiviswanathan and
                  Adam D. Smith},
  title        = {On the 'Semantics' of Differential Privacy: {A} Bayesian Formulation},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i1.634},
  doi          = {10.29012/JPC.V6I1.634},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Kasiviswanathan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KleinMS14,
  author       = {Martin Klein and
                  Thomas Mathew and
                  Bimal Sinha},
  title        = {Noise Multiplication for Statistical Disclosure Control of Extreme
                  Values in Log-normal Regression Samples},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i1.637},
  doi          = {10.29012/JPC.V6I1.637},
  timestamp    = {Thu, 10 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/KleinMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LiccardiPW14,
  author       = {Ilaria Liccardi and
                  Joseph Pato and
                  Daniel J. Weitzner},
  title        = {Improving User Choice Through Better Mobile Apps Transparency and
                  Permissions Analysis},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v5i2.630},
  doi          = {10.29012/JPC.V5I2.630},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/LiccardiPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LinK14,
  author       = {Bing{-}Rong Lin and
                  Dan Kifer},
  title        = {Towards a Systematic Analysis of Privacy Definitions},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v5i2.631},
  doi          = {10.29012/JPC.V5I2.631},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LinK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NiedermeyerSKS14,
  author       = {Frank Niedermeyer and
                  Simone Steinmetzer and
                  Martin Kroll and
                  Rainer Schnell},
  title        = {Cryptanalysis of Basic Bloom Filters Used for Privacy Preserving Record
                  Linkage},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i2.640},
  doi          = {10.29012/JPC.V6I2.640},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/NiedermeyerSKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ReiterWZ14,
  author       = {Jerome P. Reiter and
                  Quanli Wang and
                  Biyuan Zhang},
  title        = {Bayesian Estimation of Disclosure Risks for Multiply Imputed, Synthetic
                  Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i1.635},
  doi          = {10.29012/JPC.V6I1.635},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/ReiterWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/SmithE14,
  author       = {Duncan Smith and
                  Mark J. Elliot},
  title        = {A Graph-based Approach to Key Variable Mapping},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i2.641},
  doi          = {10.29012/JPC.V6I2.641},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/SmithE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/TudorCS14,
  author       = {Caroline Tudor and
                  George Cornish and
                  Keith Spicer},
  title        = {Intruder Testing on the 2011 {UK} Census: Providing Practical Evidence
                  for Disclosure Protection},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v5i2.632},
  doi          = {10.29012/JPC.V5I2.632},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/TudorCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/VatsalanCOV14,
  author       = {Dinusha Vatsalan and
                  Peter Christen and
                  Christine M. O'Keefe and
                  Vassilios S. Verykios},
  title        = {An Evaluation Framework for Privacy-Preserving Record Linkage},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i1.636},
  doi          = {10.29012/JPC.V6I1.636},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/VatsalanCOV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WrightS14,
  author       = {Stephen E. Wright and
                  Byran J. Smucker},
  title        = {An Intuitive Formulation and Solution of the Exact Cell-Bounding Problem
                  for Contingency Tables of Conditional Frequencies},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v5i2.633},
  doi          = {10.29012/JPC.V5I2.633},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/WrightS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AbowdSV13,
  author       = {John M. Abowd and
                  Matthew J. Schneider and
                  Lars Vilhuber},
  title        = {Differential Privacy Applications to Bayesian and Linear Mixed Model
                  Estimation},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v5i1.627},
  doi          = {10.29012/JPC.V5I1.627},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AbowdSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg13,
  author       = {Stephen E. Fienberg},
  title        = {Is the Privacy of Network Data an Oxymoron?},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.619},
  doi          = {10.29012/JPC.V4I2.619},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/HallWR13,
  author       = {Robert J. Hall and
                  Larry A. Wasserman and
                  Alessandro Rinaldo},
  title        = {Random Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.621},
  doi          = {10.29012/JPC.V4I2.621},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/HallWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KenthapadiKMM13,
  author       = {Krishnaram Kenthapadi and
                  Aleksandra Korolova and
                  Ilya Mironov and
                  Nina Mishra},
  title        = {Privacy via the Johnson-Lindenstrauss Transform},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v5i1.625},
  doi          = {10.29012/JPC.V5I1.625},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/KenthapadiKMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kifer13,
  author       = {Dan Kifer},
  title        = {Introduction to Special Section},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v5i1.626},
  doi          = {10.29012/JPC.V5I1.626},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Kifer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kraus13,
  author       = {Rebecca S. Kraus},
  title        = {Statistical D{\'{e}}j{\`{a}} Vu: The National Data Center Proposal
                  of 1965 and Its Descendants},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v5i1.624},
  doi          = {10.29012/JPC.V5I1.624},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Kraus13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LeeKO13,
  author       = {Joo Ho Lee and
                  In Yong Kim and
                  Christine M. O'Keefe},
  title        = {On Regression-Tree-Based Synthetic Data Methods for Business Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v5i1.628},
  doi          = {10.29012/JPC.V5I1.628},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/LeeKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LinW13,
  author       = {Yan{-}Xia Lin and
                  Phillip Wise},
  title        = {Estimation of Regression Parameters from Noise Multiplied Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.622},
  doi          = {10.29012/JPC.V4I2.622},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/LinW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/StutzmanGA13,
  author       = {Fred Stutzman and
                  Ralph Gross and
                  Alessandro Acquisti},
  title        = {Silent Listeners: The Evolution of Privacy and Disclosure on Facebook},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.620},
  doi          = {10.29012/JPC.V4I2.620},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/StutzmanGA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/UhlerSF13,
  author       = {Caroline Uhler and
                  Aleksandra B. Slavkovic and
                  Stephen E. Fienberg},
  title        = {Privacy-Preserving Data Sharing for Genome-Wide Association Studies},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v5i1.629},
  doi          = {10.29012/JPC.V5I1.629},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/UhlerSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/X13,
  title        = {Consumer Data Privacy in a Networked World: {A} Framework for Protecting
                  Privacy and Promoting Innovation in the Global Digital Economy},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.623},
  doi          = {10.29012/JPC.V4I2.623},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/X13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/FienbergJ12,
  author       = {Stephen E. Fienberg and
                  Jiashun Jin},
  title        = {Privacy-Preserving Data Sharing in High Dimensional Regression and
                  Classification Settings},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.618},
  doi          = {10.29012/JPC.V4I1.618},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/FienbergJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KiferL12,
  author       = {Daniel Kifer and
                  Bing{-}Rong Lin},
  title        = {An Axiomatic View of Statistical Privacy and Utility},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.610},
  doi          = {10.29012/JPC.V4I1.610},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KiferL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/McClureR12,
  author       = {David McClure and
                  Jerome P. Reiter},
  title        = {Towards Providing Automated Feedback on the Quality of Inferences
                  from Synthetic Datasets},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.616},
  doi          = {10.29012/JPC.V4I1.616},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/McClureR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NardiFH12,
  author       = {Yuval Nardi and
                  Stephen E. Fienberg and
                  Robert J. Hall},
  title        = {Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated
                  Data from Different Private Sources},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.617},
  doi          = {10.29012/JPC.V4I1.617},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/NardiFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/OKeefeSML12,
  author       = {Christine M. O'Keefe and
                  Ross Stewart Sparks and
                  Damien McAullay and
                  Bronwyn Loong},
  title        = {Confidentialising Survival Analysis Output in a Remote Data Access
                  System},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.614},
  doi          = {10.29012/JPC.V4I1.614},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/OKeefeSML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/RubinsteinBHT12,
  author       = {Benjamin I. P. Rubinstein and
                  Peter L. Bartlett and
                  Ling Huang and
                  Nina Taft},
  title        = {Learning in a Large Function Space: Privacy-Preserving Mechanisms
                  for {SVM} Learning},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.612},
  doi          = {10.29012/JPC.V4I1.612},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/RubinsteinBHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ShlomoS12,
  author       = {Natalie Shlomo and
                  Chris J. Skinner},
  title        = {Privacy Protection from Sampling and Perturbation in Survey Microdata},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.615},
  doi          = {10.29012/JPC.V4I1.615},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/ShlomoS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/SlavkovicS12,
  author       = {Aleksandra B. Slavkovic and
                  Adam D. Smith},
  title        = {Special Issue on Statistical and Learning-Theoretic Challenges in
                  Data Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.609},
  doi          = {10.29012/JPC.V4I1.609},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/SlavkovicS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Wasserman12,
  author       = {Larry A. Wasserman},
  title        = {Minimaxity, Statistical Thinking and Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.611},
  doi          = {10.29012/JPC.V4I1.611},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Wasserman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/YangFR12,
  author       = {Xiaolin Yang and
                  Stephen E. Fienberg and
                  Alessandro Rinaldo},
  title        = {Differential Privacy for Protecting Multi-dimensional Contingency
                  Table Data: Extensions and Applications},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.613},
  doi          = {10.29012/JPC.V4I1.613},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/YangFR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Charest11,
  author       = {Anne{-}Sophie Charest},
  title        = {How Can We Analyze Differentially-Private Synthetic Datasets?},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v2i2.589},
  doi          = {10.29012/JPC.V2I2.589},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Charest11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Commission11,
  author       = {Federal Trade Commission},
  title        = {Protecting Consumer Privacy in an Era of Rapid Change - {A} Proposed
                  Framework for Businesses and Policymakers (Preliminary {FTC} Staff
                  Report)},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i1.596},
  doi          = {10.29012/JPC.V3I1.596},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Commission11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Duncan11,
  author       = {George Duncan},
  title        = {Commentary: Future {U.S.} National Statistics Use of Administrative
                  Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.603},
  doi          = {10.29012/JPC.V3I2.603},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Duncan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg11,
  author       = {Stephen E. Fienberg},
  title        = {Editorial: In This Issue},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i1.592},
  doi          = {10.29012/JPC.V3I1.592},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg11a,
  author       = {Stephen E. Fienberg},
  title        = {In This Issue},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.598},
  doi          = {10.29012/JPC.V3I2.598},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg11b,
  author       = {Stephen E. Fienberg},
  title        = {Toward a Reconceptualization of Confidentiality Protection in the
                  Context of Linkages with Administrative Records},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.604},
  doi          = {10.29012/JPC.V3I2.604},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg11c,
  author       = {Stephen E. Fienberg},
  title        = {In This Issue},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v2i2.587},
  doi          = {10.29012/JPC.V2I2.587},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Force11,
  author       = {The Department of Commerce Internet Policy Task Force},
  title        = {Commercial Data Privacy and Innovation in the Internet Economy: {A}
                  Dynamic Policy Framework},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i1.597},
  doi          = {10.29012/JPC.V3I1.597},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Force11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Gates11,
  author       = {Gerald W. Gates},
  title        = {How Uncertainty about Privacy and Confidentiality is Hampering Efforts
                  to More Effectively Use Administrative Records in Producing {U.S.}
                  National Statistics},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.599},
  doi          = {10.29012/JPC.V3I2.599},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Gates11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Gates11a,
  author       = {Gerald W. Gates},
  title        = {Rejoinder},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.608},
  doi          = {10.29012/JPC.V3I2.608},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Gates11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KinneyRB11,
  author       = {Satkartar K. Kinney and
                  Jerome P. Reiter and
                  James O. Berger},
  title        = {Model Selection when multiple imputation is used to protect confidentiality
                  in public use data},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v2i2.588},
  doi          = {10.29012/JPC.V2I2.588},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KinneyRB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Korolova11,
  author       = {Aleksandra Korolova},
  title        = {Privacy Violations Using Microtargeted Ads: {A} Case Study},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i1.594},
  doi          = {10.29012/JPC.V3I1.594},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Korolova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Lane11,
  author       = {Julia Ingrid Lane},
  title        = {A Dissenting View from Julia Lane},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.601},
  doi          = {10.29012/JPC.V3I2.601},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Lane11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Lindell11,
  author       = {Yehuda Lindell},
  title        = {Anonymous Authentication},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v2i2.590},
  doi          = {10.29012/JPC.V2I2.590},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Lindell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Madans11,
  author       = {Jennifer H. Madans},
  title        = {Use of Administrative Records and the Privacy-Confidentiality Trade-off},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.602},
  doi          = {10.29012/JPC.V3I2.602},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Madans11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Merener11,
  author       = {Martin M. Merener},
  title        = {Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued
                  Databases},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v2i2.591},
  doi          = {10.29012/JPC.V2I2.591},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Merener11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Prewitt11,
  author       = {Kenneth Prewitt},
  title        = {Why It Matters to Distinguish Between Privacy and Confidentiality},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.600},
  doi          = {10.29012/JPC.V3I2.600},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Prewitt11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Reiter11,
  author       = {Jerome P. Reiter},
  title        = {Comment on Article by Gates},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.605},
  doi          = {10.29012/JPC.V3I2.605},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Reiter11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Scheuren11,
  author       = {Fritz J. Scheuren},
  title        = {Trust but Pre-Verify?},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.606},
  doi          = {10.29012/JPC.V3I2.606},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Scheuren11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Simpson11,
  author       = {Andrew C. Simpson},
  title        = {On Privacy and Public Data: a Study of data.gov.uk},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i1.595},
  doi          = {10.29012/JPC.V3I1.595},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Simpson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ToubianaN11,
  author       = {Vincent Toubiana and
                  Helen Nissenbaum},
  title        = {An Analysis of Google Logs Retention Policies},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i1.593},
  doi          = {10.29012/JPC.V3I1.593},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/ToubianaN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Zaslavsky11,
  author       = {Alan M. Zaslavsky},
  title        = {Privacy and the Statistician: What Do We Need to Know to Certify Nondisclosure?},
  journal      = {J. Priv. Confidentiality},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.29012/jpc.v3i2.607},
  doi          = {10.29012/JPC.V3I2.607},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Zaslavsky11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Cox10,
  author       = {Lawrence H. Cox},
  title        = {Vulnerability of Complementary Cell Suppression to Intruder Attack},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.576},
  doi          = {10.29012/JPC.V1I2.576},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Cox10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkN10,
  author       = {Cynthia Dwork and
                  Moni Naor},
  title        = {On the Difficulties of Disclosure Prevention in Statistical Databases
                  or The Case for Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.585},
  doi          = {10.29012/JPC.V2I1.585},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkS10,
  author       = {Cynthia Dwork and
                  Adam D. Smith},
  title        = {Differential Privacy for Statistics: What we Know and What we Want
                  to Learn},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.570},
  doi          = {10.29012/JPC.V1I2.570},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg10,
  author       = {Stephen E. Fienberg},
  title        = {Editorial: In This Issue},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.578},
  doi          = {10.29012/JPC.V2I1.578},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg10a,
  author       = {Stephen E. Fienberg},
  title        = {The Relevance or Irrelevance of Weights for Confidentiality and Statistical
                  Analyses},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.572},
  doi          = {10.29012/JPC.V1I2.572},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Karr10,
  author       = {Alan F. Karr},
  title        = {Secure Statistical Analysis of Distributed Databases, Emphasizing
                  What We Don't Know},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.573},
  doi          = {10.29012/JPC.V1I2.573},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Karr10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KinneyKG10,
  author       = {Satkartar K. Kinney and
                  Alan F. Karr and
                  Joe Fred Gonzalez Jr.},
  title        = {Data Confidentiality: The Next Five Years Summary and Guide to Papers},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.569},
  doi          = {10.29012/JPC.V1I2.569},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KinneyKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LinK10,
  author       = {Xiaodong Lin and
                  Alan F. Karr},
  title        = {Privacy-preserving Maximum Likelihood Estimation for Distributed Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.574},
  doi          = {10.29012/JPC.V1I2.574},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LinK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/NabarM10,
  author       = {Shubha U. Nabar and
                  Nina Mishra},
  title        = {Releasing Private Contingency Tables},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.586},
  doi          = {10.29012/JPC.V2I1.586},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/NabarM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/PerryV10,
  author       = {William J. Perry and
                  Charles M. Vest},
  title        = {Protecting Individual Privacy in the Struggle Against Terrorists{\textemdash}A
                  Framework for Program Assessment: Executive Summary},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.582},
  doi          = {10.29012/JPC.V2I1.582},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/PerryV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/PerryV10a,
  author       = {William J. Perry and
                  Charles M. Vest},
  title        = {The Science and Technology of Privacy Protection: Appendix {L} of
                  "Protecting Individual Privacy in the Struggle Against Terrorists"},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.583},
  doi          = {10.29012/JPC.V2I1.583},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/PerryV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Reiter10,
  author       = {Jerome P. Reiter},
  title        = {Multiple Imputation for Disclosure Limitation: Future Research Challenges},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.575},
  doi          = {10.29012/JPC.V1I2.575},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Reiter10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Schneier10,
  author       = {Bruce Schneier},
  title        = {Schneier on Security: Privacy and Control},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.579},
  doi          = {10.29012/JPC.V2I1.579},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Schneier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Shlomo10,
  author       = {Natalie Shlomo},
  title        = {Releasing Microdata: Disclosure Risk Estimation, Data Masking and
                  Assessing Utility},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.584},
  doi          = {10.29012/JPC.V2I1.584},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Shlomo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Singh10,
  author       = {Avinash C. Singh},
  title        = {Maintaining Analytic Utility while Protecting Confidentiality of Survey
                  and Nonsurvey Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.571},
  doi          = {10.29012/JPC.V1I2.571},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Singh10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Slavkovic10,
  author       = {Aleksandra B. Slavkovic},
  title        = {Partial Information Releases for Confidential Contingency Table Entries:
                  Present and Future Research Efforts},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.577},
  doi          = {10.29012/JPC.V1I2.577},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Slavkovic10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WaldoLC10,
  author       = {James Waldo and
                  Herbert S. Lin and
                  Lawrence H. Cox},
  title        = {Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information
                  Technology in a Digital Age"},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.581},
  doi          = {10.29012/JPC.V2I1.581},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WaldoLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WaldoLM10,
  author       = {James Waldo and
                  Herbert S. Lin and
                  Lynette I. Millett},
  title        = {Engaging Privacy and Information Technology in a Digital Age: Executive
                  Summary},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.580},
  doi          = {10.29012/JPC.V2I1.580},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WaldoLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AbowdNS09,
  author       = {John M. Abowd and
                  Kobbi Nissim and
                  Chris J. Skinner},
  title        = {First Issue Editorial},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.562},
  doi          = {10.29012/JPC.V1I1.562},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AbowdNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AndersonS09,
  author       = {Margo J. Anderson and
                  William Seltzer},
  title        = {Federal Statistical Confidentiality and Business Data: Twentieth Century
                  Challenges and Continuing Issues},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.563},
  doi          = {10.29012/JPC.V1I1.563},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AndersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AndersonS09a,
  author       = {Margo J. Anderson and
                  William Seltzer},
  title        = {Rejoinder},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.565},
  doi          = {10.29012/JPC.V1I1.565},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/AndersonS09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kincannon09,
  author       = {Charles L. Kincannon},
  title        = {Comment on Article by Anderson and Seltzer},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.564},
  doi          = {10.29012/JPC.V1I1.564},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Kincannon09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LindellP09,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Multiparty Computation for Privacy-Preserving Data Mining},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.566},
  doi          = {10.29012/JPC.V1I1.566},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LindellP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/ReiterM09,
  author       = {Jerome P. Reiter and
                  Robin Mitra},
  title        = {Estimating Risks of Identification Disclosure in Partially Synthetic
                  Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.567},
  doi          = {10.29012/JPC.V1I1.567},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/ReiterM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WooROK09,
  author       = {Mi{-}Ja Woo and
                  Jerome P. Reiter and
                  Anna Oganian and
                  Alan F. Karr},
  title        = {Global Measures of Data Utility for Microdata Masked for Disclosure
                  Limitation},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.568},
  doi          = {10.29012/JPC.V1I1.568},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/WooROK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}