Introduction (1/06/10)
Overview of HIPAA (1/11/10)
Achieving k-anonymity privacy protection using generalization and suppression (1/11/10)
L-diversity privacy beyond k-anonymity (1/13/10)
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity (1/13/10)
An Introduction to Differential Privacyand and its Applications (1/25/10)
Calibrating Noise to Sensitivity in Private Data Analysis (1/27/10)
Data Publishing Against Realistic Adversaries (2/1/10)
Privacy Preserving Publication of Moving Object Data (2/3/10)
Privacy preservation in pervasive spaces (overview) (3/1/10)
RFID Security: In the Shoulder and on the Loading Dock (3/10/10)