Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks. Raisaro, J. L., Tramèr, F., Ji, Z., Bu, D., Zhao, Y., Carey, W. K., Lloyd, D. D., Sofia, H., Baker, D., Flicek, P., Shringarpure, S. S., Bustamante, C. D., Wang, S., Jiang, X., Ohno-Machado, L., Tang, H., Wang, X., & Hubaux, J. JAMIA, 24(4):799–805, 2017.
Paper doi bibtex @article{DBLP:journals/jamia/RaisaroTJBZCLSB17,
author = {Jean Louis Raisaro and
Florian Tram{\`{e}}r and
Zhanglong Ji and
Diyue Bu and
Yongan Zhao and
W. Knox Carey and
David D. Lloyd and
Heidi Sofia and
Dixie Baker and
Paul Flicek and
Suyash S. Shringarpure and
Carlos D. Bustamante and
Shuang Wang and
Xiaoqian Jiang and
Lucila Ohno{-}Machado and
Haixu Tang and
XiaoFeng Wang and
Jean{-}Pierre Hubaux},
title = {Addressing Beacon re-identification attacks: quantification and mitigation
of privacy risks},
journal = {{JAMIA}},
volume = {24},
number = {4},
pages = {799--805},
year = {2017},
url = {https://doi.org/10.1093/jamia/ocw167},
doi = {10.1093/jamia/ocw167},
timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jamia/RaisaroTJBZCLSB17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"RaMQ8AmcgRXEqxnPd","bibbaseid":"raisaro-tramr-ji-bu-zhao-carey-lloyd-sofia-etal-addressingbeaconreidentificationattacksquantificationandmitigationofprivacyrisks-2017","authorIDs":[],"author_short":["Raisaro, J. L.","Tramèr, F.","Ji, Z.","Bu, D.","Zhao, Y.","Carey, W. K.","Lloyd, D. D.","Sofia, H.","Baker, D.","Flicek, P.","Shringarpure, S. S.","Bustamante, C. D.","Wang, S.","Jiang, X.","Ohno-Machado, L.","Tang, H.","Wang, X.","Hubaux, J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Jean","Louis"],"propositions":[],"lastnames":["Raisaro"],"suffixes":[]},{"firstnames":["Florian"],"propositions":[],"lastnames":["Tramèr"],"suffixes":[]},{"firstnames":["Zhanglong"],"propositions":[],"lastnames":["Ji"],"suffixes":[]},{"firstnames":["Diyue"],"propositions":[],"lastnames":["Bu"],"suffixes":[]},{"firstnames":["Yongan"],"propositions":[],"lastnames":["Zhao"],"suffixes":[]},{"firstnames":["W.","Knox"],"propositions":[],"lastnames":["Carey"],"suffixes":[]},{"firstnames":["David","D."],"propositions":[],"lastnames":["Lloyd"],"suffixes":[]},{"firstnames":["Heidi"],"propositions":[],"lastnames":["Sofia"],"suffixes":[]},{"firstnames":["Dixie"],"propositions":[],"lastnames":["Baker"],"suffixes":[]},{"firstnames":["Paul"],"propositions":[],"lastnames":["Flicek"],"suffixes":[]},{"firstnames":["Suyash","S."],"propositions":[],"lastnames":["Shringarpure"],"suffixes":[]},{"firstnames":["Carlos","D."],"propositions":[],"lastnames":["Bustamante"],"suffixes":[]},{"firstnames":["Shuang"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Xiaoqian"],"propositions":[],"lastnames":["Jiang"],"suffixes":[]},{"firstnames":["Lucila"],"propositions":[],"lastnames":["Ohno-Machado"],"suffixes":[]},{"firstnames":["Haixu"],"propositions":[],"lastnames":["Tang"],"suffixes":[]},{"firstnames":["XiaoFeng"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Jean-Pierre"],"propositions":[],"lastnames":["Hubaux"],"suffixes":[]}],"title":"Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks","journal":"JAMIA","volume":"24","number":"4","pages":"799–805","year":"2017","url":"https://doi.org/10.1093/jamia/ocw167","doi":"10.1093/jamia/ocw167","timestamp":"Fri, 30 Nov 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/jamia/RaisaroTJBZCLSB17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jamia/RaisaroTJBZCLSB17,\n author = {Jean Louis Raisaro and\n Florian Tram{\\`{e}}r and\n Zhanglong Ji and\n Diyue Bu and\n Yongan Zhao and\n W. Knox Carey and\n David D. Lloyd and\n Heidi Sofia and\n Dixie Baker and\n Paul Flicek and\n Suyash S. Shringarpure and\n Carlos D. Bustamante and\n Shuang Wang and\n Xiaoqian Jiang and\n Lucila Ohno{-}Machado and\n Haixu Tang and\n XiaoFeng Wang and\n Jean{-}Pierre Hubaux},\n title = {Addressing Beacon re-identification attacks: quantification and mitigation\n of privacy risks},\n journal = {{JAMIA}},\n volume = {24},\n number = {4},\n pages = {799--805},\n year = {2017},\n url = {https://doi.org/10.1093/jamia/ocw167},\n doi = {10.1093/jamia/ocw167},\n timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/jamia/RaisaroTJBZCLSB17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Raisaro, J. L.","Tramèr, F.","Ji, Z.","Bu, D.","Zhao, Y.","Carey, W. K.","Lloyd, D. D.","Sofia, H.","Baker, D.","Flicek, P.","Shringarpure, S. S.","Bustamante, C. D.","Wang, S.","Jiang, X.","Ohno-Machado, L.","Tang, H.","Wang, X.","Hubaux, J."],"key":"DBLP:journals/jamia/RaisaroTJBZCLSB17","id":"DBLP:journals/jamia/RaisaroTJBZCLSB17","bibbaseid":"raisaro-tramr-ji-bu-zhao-carey-lloyd-sofia-etal-addressingbeaconreidentificationattacksquantificationandmitigationofprivacyrisks-2017","role":"author","urls":{"Paper":"https://doi.org/10.1093/jamia/ocw167"},"downloads":0,"html":"","metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/158/7224.bib","creationDate":"2020-03-17T22:37:26.432Z","downloads":0,"keywords":[],"search_terms":["addressing","beacon","identification","attacks","quantification","mitigation","privacy","risks","raisaro","tramèr","ji","bu","zhao","carey","lloyd","sofia","baker","flicek","shringarpure","bustamante","wang","jiang","ohno-machado","tang","wang","hubaux"],"title":"Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks","year":2017,"dataSources":["c3gSkZjbHhcAcnkQc"]}