1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
|
@Article{Barker:2012:VPW,
author = "Ken Barker",
title = "``Valuing'' Privacy While Exposing Data Utility",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6121",
pages = "1--2",
year = "2012",
CODEN = "LNCSD9",
DOI = "http://dx.doi.org/10.1007/978-3-642-25704-9_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN = "0302-9744 (bad check digit), 1611-334X (bad check digit)",
ISSN-L = "0302-9743",
ISSN-L = "0302-9742 (bad check digit)",
%% bad ISSN-L length in next line
ISSN-L = "03029742",
bibdate = "Wed Dec 19 15:20:12 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
URL = "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-25704-9_1",
acknowledgement = ack-nhfb,
book-DOI = "http://dx.doi.org/10.1007/978-3-642-25704-9",
book-URL = "http://www.springerlink.com/content/978-3-642-25704-9",
fjournal = "Lecture Notes in Computer Science",
}
|