• A parallelization framework for exact knowledge hiding in transactional databases 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2008)
      The hiding of sensitive knowledge, mined from transactional databases, is one of the primary goals of privacy preserving data mining. The increased storage capabilities of modern databases and the necessity for hiding ...
    • PLOT: Privacy in location based services: An open-ended toolbox 

      Gkoulalas-Divanis, A.; Verykios, V. S.; Eleftheriou, D. (2009)
      The widespread adoption of Location Based Services (LBSs) coupled with recent advances in location tracking technologies, pose serious concerns to user privacy. As a consequence, privacy preserving approaches have been ...
    • Privacy and security in spatiotemporal data and trajectories 

      Verykios, V. S.; Damiani, M. L.; Gkoulalas-Divanis, A. (2008)
      The European directive 2002/58/EC requires providers of public communication networks and electronic communication services to adopt techniques to ensure data security and privacy. This directive states, among others, that ...
    • Privacy in spatiotemporal data mining 

      Bonchi, F.; Saygin, Y.; Verykios, V. S.; Atzori, M.; Gkoulalas-Divanis, A.; Kaya, S. V.; Savaś, E. (2008)
      Privacy is an essential requirement for the provision of electronic and knowledgebased services in modern e-business, e-commerce, e-government, and e-health environments. Nowadays, service providers can easily track ...
    • Privacy in trajectory data 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2009)
      In this era of significant advances in telecommunications and GPS sensors technology, a person can be tracked down to proximity of less than 5 meters. This remarkable progress enabled the offering of services that depend ...
    • Privacy preserving record linkage approaches 

      Verykios, V. S.; Karakasidis, A.; Mitrogiannis, V. K. (2009)
      Privacy-preserving record linkage is a very important task, mostly because of the very sensitive nature of the personal data. The main focus in this task is to find a way to match records from among different organisation ...
    • Privacy preserving record linkage using phonetic codes 

      Karakasidis, A.; Verykios, V. S. (2009)
      Phonetic codes such as Soundex and Metaphone have been used in the past to address the Record Linkage Problem. However, to the best of our knowledge, no particular effort has been made within this context towards privacy ...
    • Privacy protection: Regulations and technologies, opportunities and threats 

      Pedreschi, D.; Bonchi, F.; Turini, F.; Verykios, V. S.; Atzori, M.; Malin, B.; Moelans, B.; Saygin, Y. (2008)
      Information and communication technologies (ICTs) touch many aspects of our lives. The integration of ICTs is enhanced by the advent of mobile, wireless, and ubiquitous technologies. ICTs are increasingly embedded in common ...
    • A quantitative and qualitative analysis of blocking in association rule hiding 

      Pontikakis, E. D.; Tsitsonis, A. A.; Verykios, V. S.; Theodoridis, Y.; Chang, L. (2004)
      Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ...
    • Reconstruction-based classification rule hiding through controlled data modification 

      Katsarou, A.; Aris, G. D.; Verykios, V. S. (2009)
      In this paper, we propose a reconstruction-based approach to classification rule hiding in categorical datasets. The proposed methodology modifies transactions supporting both sensitive and nonsensitive classification rules ...
    • Reference table based k-anonymous private blocking 

      Karakasidis, A.; Verykios, V. S. (2012)
      Privacy Preserving Record Linkage is an emerging field of research which attempts to deal with the classical linkage problem from a privacy preserving point of view. In this paper we propose a novel approach for performing ...
    • Uncertainty for anonymity and 2-dimensional range query distortion 

      Sioutas, S.; Magkos, E.; Karydis, I.; Verykios, V. S. (2010)
      In this work, we study the problem of anonymity-preserving data publishing in moving objects databases. In particular, the trajectory of a mobile user on the plane is no longer a polyline in a two-dimensional space, instead ...