Amanote Research
Register
Sign In
Privacy Protection: P-Sensitive K-Anonymity Property
doi 10.1109/icdew.2006.116
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2006
Authors
T.M. Truta
B. Vinay
Publisher
IEEE
Related search
K-Anonymity Algorithm Using Encryption for Location Privacy Protection
International Journal of Multimedia and Ubiquitous Engineering
Computer Science
Privacy Preservation in Data Centric Environment Using K-Anonymity
International Journal for Research in Applied Science and Engineering Technology
Multi-Dimensional K-Anonymity Based on Mapping for Protecting Privacy
Journal of Software
Protecting Privacy Using K-Anonymity With a Hybrid Search Scheme
International Journal of Computer and Communication Engineering
Beyond K-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
D2D Big Data Privacy-Preserving Framework Based on (A, K)-Anonymity Model
Mathematical Problems in Engineering
Mathematics
Engineering
Mobile Agents: Preserving Privacy and Anonymity
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Data Utility and Privacy Protection Trade-Off in K-Anonymisation
Increasing Data Anonymity Using AES and Privacy Technique
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation