共 50 条
- [1] Research on K-Anonymity Algorithm in Privacy Protection [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
- [2] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
- [3] Study on Privacy Protection Algorithm Based on K-Anonymity [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
- [4] Study on Privacy Protection Algorithm Based on K-Anonymity [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
- [5] Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 289 - 293
- [6] K-Anonymity Privacy Protection Using Ontology [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
- [7] Methods for Privacy Protection Using K-Anonymity [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
- [8] A trusted de-swinging k-anonymity scheme for location privacy protection [J]. Journal of Cloud Computing, 11
- [9] A trusted de-swinging k-anonymity scheme for location privacy protection [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
- [10] Conditional privacy protection authentication scheme based on bilinear pairings for vanet [J]. Journal of China Universities of Posts and Telecommunications, 2020, 27 (01): : 62 - 71