Page 476 - Invited Paper Session (IPS) - Volume 1
P. 476
IPS177 F. Ricciato et al.
www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2017
/6_secret_sharing.pdf.
10. UN Handbook on Privacy-Preserving Computation Techniques, April
2019. Available online at http://tinyurl.com/y4do5he4.
11. L Leaver, Victoria and Marley, Jennifer K. (2011) A Method for
Confidentialising User-Defined Tables: Statistical Properties and a Risk-
Utility Analysis; ISI conference, Dublin 2011.
12. G. Thompson et al (2013) Methodology for the Automatic
Confidentialisation of Statistical Outputs from Remote Servers at the
Australian Bureau of Statistics, UNECE Works Session on Statistical
Confidentiality, Ottawa, Canada, 20-23 October 2013.
13. P.P. de Wolf, Perturbative methods for ESS census tables, conference
on New Techniques and Technologies for Statistics, Brussels, March
2019.
14. M. Sabt, M. Achemlal, A. Bouabdallah, Trusted Execution Environment:
What It is, and What It is Not. 2015 IEEE Trustcom/BigDataSE/ISPA. DOI
10.1109/Trustcom.2015.357.
15. G. Spindler and P. Schmechel, Personal Data and Encryption in the
European General Data Protection Regulation, (2016) JIPITEC 163 para
1. Online: https://www.jipitec.eu/issues/jipitec-7-2-
2016/4440/spindler_schmechel_gdpr_encryption_jipitec_7_2_2016_163.
pdf
465 | I S I W S C 2 0 1 9