共 50 条
- [41] How anonymous is k-anonymous? Look at your quasi-ID SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 1 - +
- [42] LTPPM: a location and trajectory privacy protection mechanism in participatory sensing WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (01): : 155 - 169
- [43] Location privacy-preserving Mobile Crowd Sensing with Anonymous Reputation 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1812 - 1817
- [44] Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 387 - 411
- [45] K-anonymous multi-party secret handshakes FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 72 - +
- [46] A k-anonymous rule clustering approach for data publishing 1600, Fuji Technology Press (21): : 980 - 988
- [47] Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 3 - 17
- [48] Mobile Systems Location Privacy: "MobiPriv" A Robust K Anonymous System 2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 54 - 63
- [50] User-side adaptive protection of location privacy in participatory sensing GeoInformatica, 2014, 18 : 165 - 191