共 50 条
- [41] Location privacy: going beyond K-anonymity, cloaking and anonymizers Knowledge and Information Systems, 2011, 26 : 435 - 465
- [45] k-Presence-Secrecy: Practical Privacy Model as Extension of k-Anonymity IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (04): : 730 - 740
- [46] Multirelational k-anonymity 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1392 - +
- [47] Weak k-anonymity:: A low-distortion model for protecting privacy INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 60 - 71
- [48] Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 279 - 286
- [49] kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 63 - +
- [50] Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 258 - 264