共 50 条
- [43] Minimum Spanning Tree Based k-Anonymity [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 405 - 413
- [44] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud [J]. Arabian Journal for Science and Engineering, 2020, 45 : 2425 - 2432
- [45] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
- [46] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
- [47] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity [J]. FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
- [48] A Game-Theoretic Approach for Achieving k-Anonymity in Location Based Services [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2985 - 2993