Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Cheong Ghil Kim
Protecting Privacy Using K-Anonymity With a Hybrid Search Scheme
International Journal of Computer and Communication Engineering
Related publications
Multi-Dimensional K-Anonymity Based on Mapping for Protecting Privacy
Journal of Software
K-Anonymity Algorithm Using Encryption for Location Privacy Protection
International Journal of Multimedia and Ubiquitous Engineering
Computer Science
Privacy Preservation in Data Centric Environment Using K-Anonymity
International Journal for Research in Applied Science and Engineering Technology
Privacy Protection: P-Sensitive K-Anonymity Property
Beyond K-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
D2D Big Data Privacy-Preserving Framework Based on (A, K)-Anonymity Model
Mathematical Problems in Engineering
Mathematics
Engineering
A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment
Ingenierie des Systemes d'Information
Information Systems
Increasing Data Anonymity Using AES and Privacy Technique
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
A Differential Privacy Protecting K-Means Clustering Algorithm Based on Contour Coefficients
PLoS ONE
Multidisciplinary