共 50 条
- [1] Research on K-Anonymity Algorithm in Privacy Protection PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
- [2] Research on uncertain data privacy protection based on K-anonymity Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
- [3] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
- [4] Study on Privacy Protection Algorithm Based on K-Anonymity 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
- [5] Study on Privacy Protection Algorithm Based on K-Anonymity 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
- [6] Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 289 - 293
- [7] K-Anonymity Privacy Protection Using Ontology 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
- [8] Methods for Privacy Protection Using K-Anonymity PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
- [9] A trusted de-swinging k-anonymity scheme for location privacy protection Journal of Cloud Computing, 11
- [10] A trusted de-swinging k-anonymity scheme for location privacy protection JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):