共 50 条
- [1] A K-anonymity Based Semantic Model For Protecting Personal Information and Privacy [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1443 - +
- [2] Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT [J]. 2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2019,
- [3] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
- [4] Dummy Location Selection Scheme for K-anonymity in Location based Services [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 441 - 448
- [6] A Clustering K-Anonymity Scheme for Location Privacy Preservation [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
- [7] Risk & distortion based K-anonymity [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 345 - 358
- [8] K-Anonymity Based on Sensitive Tuples [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 91 - +
- [9] The Analysis of Typical Algorithms Based on K-Anonymity [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 327 - 330
- [10] K-Anonymity Algorithm Based on Improved Clustering [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476