-
A data set provides k-anonymity for the data subjects represented if the information for each person contained in the data set cannot be distinguished from at least k-1 individuals whose information a…
-
Since there has been no final decisions made to cohort/k-anonymity sizes, as well as conversion thresholds, I created a calculator to see how different scenarios would perform by inputting cohort siz…
-
- automated regression/unit tests for this component
- based on some sample data
- @tbasso provides data and test cases
- @mrmassis implements tests
-
While not specific to the implementation of the DP-3T, in looking at a system to determine contacts that may be utilized by hospitals, it seems it would be ideal to leverage the property of k-anonymit…
-
From CRITEO recommendation team
**Request:**
We propose increasing the limit on the number of ad components entering the bid from 20 to 40.
**Background**:
The current limitation on the nu…
-
While not specific to the implementation of the TCN, in looking at a system to determine contacts that may be utilized by hospitals, it seems it would be ideal to leverage the property of k-anonymity.…
-
Hello, after reading your paper and this project, I did not understand how TorKameleon proxy achieves user K-anonymity. I read Tork and Tir mentioned in your paper. These two schemes basically confuse…
-
Hello,
I am trying to get the demo running locally on Chrome Beta. However, I run into the following issue for the advertiser website.
**_Attestation check for Protected Audience on https://protecte…
-
k-anonymity here is intended, I believe, to provide the protection that an ad can't be microtargeted to an individual or very small group. That is, a company can't tag a customer by name/identifier, a…
-
### Imported from AB/Connect bitbucket: https://bitbucket.org/openid/connect/issues/1871
### Original Reporter: Nat
In the case of cloud based wallet \(aka IdP\), not only k-anonymity but pairwise p…