Accepted articles here
Volume 18 Issue 2 Volume 18 Issue 1
Volume 17 Issue 3 Volume 17 Issue 2 Volume 17 Issue 1
Volume 16 Issue 3 Volume 16 Issue 2 Volume 16 Issue 1
Volume 15 Issue 3 Volume 15 Issue 2 Volume 15 Issue 1
Volume 14 Issue 3 Volume 14 Issue 2 Volume 14 Issue 1
Volume 13 Issue 3 Volume 13 Issue 2 Volume 13 Issue 1
Volume 12 Issue 3 Volume 12 Issue 2 Volume 12 Issue 1
Volume 11 Issue 3 Volume 11 Issue 2 Volume 11 Issue 1
Volume 10 Issue 3 Volume 10 Issue 2 Volume 10 Issue 1
Volume 9 Issue 3 Volume 9 Issue 2 Volume 9 Issue 1
Volume 8 Issue 3 Volume 8 Issue 2 Volume 8 Issue 1
Volume 7 Issue 3 Volume 7 Issue 2 Volume 7 Issue 1
Volume 6 Issue 3 Volume 6 Issue 2 Volume 6 Issue 1
Volume 5 Issue 3 Volume 5 Issue 2 Volume 5 Issue 1
Volume 4 Issue 3 Volume 4 Issue 2 Volume 4 Issue 1
Volume 3 Issue 3 Volume 3 Issue 2 Volume 3 Issue 1
Volume 2 Issue 3 Volume 2 Issue 2 Volume 2 Issue 1
Volume 1 Issue 3 Volume 1 Issue 2 Volume 1 Issue 1
A graph theoretic linkage attack on microdata in a metric space
Martin Kroll
Transactions on Data Privacy 8:3 (2015) 217 - 243
Abstract, PDF
Privacy in Data Publishing for Tailored Recommendation Scenarios
João M. Gonçalves, Diogo Gomes, Rui L. Aguiar
Transactions on Data Privacy 8:3 (2015) 245 - 271
A model driven approach to data privacy verification in E-Health systems
Flora Amato, Francesco Moscato
Transactions on Data Privacy 8:3 (2015) 273 - 296