Amanote Research
Register
Sign In
Multi-Dimensional K-Anonymity Based on Mapping for Protecting Privacy
Journal of Software
doi 10.4304/jsw.6.10.1937-1944
Full Text
Open PDF
Abstract
Available in
full text
Date
October 1, 2011
Authors
Qian Wang
Cong Xu
Min Sun
Publisher
International Academy Publishing (IAP)
Related search
Protecting Privacy Using K-Anonymity With a Hybrid Search Scheme
International Journal of Computer and Communication Engineering
Blockchain-Based Multi-Purpose Authentication Method for Anonymity and Privacy
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
D2D Big Data Privacy-Preserving Framework Based on (A, K)-Anonymity Model
Mathematical Problems in Engineering
Mathematics
Engineering
K-Anonymity Algorithm Using Encryption for Location Privacy Protection
International Journal of Multimedia and Ubiquitous Engineering
Computer Science
Privacy Protection: P-Sensitive K-Anonymity Property
A Differential Privacy Protecting K-Means Clustering Algorithm Based on Contour Coefficients
PLoS ONE
Multidisciplinary
Beyond K-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Privacy Preservation in Data Centric Environment Using K-Anonymity
International Journal for Research in Applied Science and Engineering Technology
Clustering-Anonymity Method for Data-Publishing Privacy Preservation