{"title":"A Collection of Tools: The Privacy Tree","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_2","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting Disclosure by Hiding the Attribute","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_7","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131405357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting Exposure by Hiding the Identity","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_3","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding PETs","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting Exposure by Hiding the Identity-Action Pair","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_5","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122368900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting Disclosure by Hiding the Identity","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_6","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_6","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using the Privacy Tree in Practice","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_9","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128954060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting Exposure by Hiding the Action","authors":"C. Adams","doi":"10.1007/978-3-030-81043-6_4","DOIUrl":"https://doi.org/10.1007/978-3-030-81043-6_4","url":null,"abstract":"","PeriodicalId":222640,"journal":{"name":"Introduction to Privacy Enhancing Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116036518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}