Amanote Research

Amanote Research

    RegisterSign In

Multi-Dimensional K-Anonymity Based on Mapping for Protecting Privacy

Journal of Software
doi 10.4304/jsw.6.10.1937-1944
Full Text
Open PDF
Abstract

Available in full text

Date

October 1, 2011

Authors
Qian WangCong XuMin Sun
Publisher

International Academy Publishing (IAP)


Related search

Protecting Privacy Using K-Anonymity With a Hybrid Search Scheme

International Journal of Computer and Communication Engineering
2012English

Blockchain-Based Multi-Purpose Authentication Method for Anonymity and Privacy

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

D2D Big Data Privacy-Preserving Framework Based on (A, K)-Anonymity Model

Mathematical Problems in Engineering
MathematicsEngineering
2019English

K-Anonymity Algorithm Using Encryption for Location Privacy Protection

International Journal of Multimedia and Ubiquitous Engineering
Computer Science
2015English

Privacy Protection: P-Sensitive K-Anonymity Property

2006English

A Differential Privacy Protecting K-Means Clustering Algorithm Based on Contour Coefficients

PLoS ONE
Multidisciplinary
2018English

Beyond K-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Privacy Preservation in Data Centric Environment Using K-Anonymity

International Journal for Research in Applied Science and Engineering Technology
2019English

Clustering-Anonymity Method for Data-Publishing Privacy Preservation

2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy