Search dblp for Publications

export results for "stream:streams/conf/isips:"

 download as .bib file

@proceedings{DBLP:conf/isips/2008,
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10233-2},
  doi          = {10.1007/978-3-642-10233-2},
  isbn         = {978-3-642-10232-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Baginski08,
  author       = {Maureen Baginski},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Intelligence Policy and the Science of Intelligence},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {11--19},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_2},
  doi          = {10.1007/978-3-642-10233-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Baginski08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Crescenzo08,
  author       = {Giovanni Di Crescenzo},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {On the Statistical Dependency of Identity Theft on Demographics},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_12},
  doi          = {10.1007/978-3-642-10233-2\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Crescenzo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/FienbergNS08,
  author       = {Stephen E. Fienberg and
                  Yuval Nardi and
                  Aleksandra B. Slavkovic},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Valid Statistical Analysis for Logistic Regression with Multiple Sources},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {82--94},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_8},
  doi          = {10.1007/978-3-642-10233-2\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/FienbergNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/GoldbergMKM08,
  author       = {Mark K. Goldberg and
                  Malik Magdon{-}Ismail and
                  Stephen Kelley and
                  Konstantin Mertsalov},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Stable Statistics of the Blogograph},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_10},
  doi          = {10.1007/978-3-642-10233-2\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/GoldbergMKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Horning08,
  author       = {James J. Horning},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Words Matter: Privacy, Security, and Related Terms},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {57--62},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_6},
  doi          = {10.1007/978-3-642-10233-2\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Horning08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/KantorL08,
  author       = {Paul B. Kantor and
                  Michael E. Lesk},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {The Challenges of Seeking Security While Respecting Privacy},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_1},
  doi          = {10.1007/978-3-642-10233-2\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/KantorL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/KisilevichESR08,
  author       = {Slava Kisilevich and
                  Yuval Elovici and
                  Bracha Shapira and
                  Lior Rokach},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {63--81},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_7},
  doi          = {10.1007/978-3-642-10233-2\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isips/KisilevichESR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Landwehr08,
  author       = {Carl E. Landwehr},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Results of Workshops on Privacy Protection Technologies},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {45--56},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_5},
  doi          = {10.1007/978-3-642-10233-2\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Landwehr08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Mace08,
  author       = {Robyn R. Mace},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Intelligence, Dataveillance, and Information Privacy},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {34--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_4},
  doi          = {10.1007/978-3-642-10233-2\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Mace08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/McNamara08,
  author       = {Joan T. McNamara},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Suspicious Activity Reporting {(SAR)}},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {95--103},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_9},
  doi          = {10.1007/978-3-642-10233-2\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/McNamara08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Spafford08,
  author       = {Eugene H. Spafford},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Cyber Security: Assessing Our Vulnerabilities and Developing an Effective
                  Defense},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_3},
  doi          = {10.1007/978-3-642-10233-2\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Spafford08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/ThomasSBAX08,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu and
                  Elisa Bertino and
                  Ismailcem Budak Arpinar and
                  Shouhuai Xu},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Privacy-Preserving Accountable Accuracy Management Systems {(PAAMS)}},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {115--121},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_11},
  doi          = {10.1007/978-3-642-10233-2\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/ThomasSBAX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics