13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      On the Privacy of the Opal Data Release: A Response

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This document is a response to a report from the University of Melbourne on the privacy of the Opal dataset release. The Opal dataset was released by Data61 (CSIRO) in conjunction with the Transport for New South Wales (TfNSW). The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail, train and ferries. These taps are recorded through the smart ticketing system, known as Opal, available in the state of New South Wales, Australia.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          No free lunch in data privacy

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Analyzing Graphs with Node Differential Privacy

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Exposed! A Survey of Attacks on Private Data

                Bookmark

                Author and article information

                Journal
                2017-05-24
                Article
                1705.08994
                e3b9ab88-45c5-4199-b5ff-80b3fa698cb1

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article