共 50 条
- [31] How anonymous is k-anonymous? Look at your quasi-ID SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 1 - +
- [32] K-anonymous multi-party secret handshakes FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 72 - +
- [33] Local Differential Privacy with K-anonymous for Frequency Estimation 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5819 - 5828
- [35] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
- [37] The k-anonymity approach for data-publishing based on clustering partition WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 423 - 428
- [38] Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2399 - 2407
- [39] k-Anonymous Microdata Release via Post Randomisation Method ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 225 - 241
- [40] Privately updating suppression and generalization based k-anonymous databases 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1370 - +