共 50 条
- [31] Privacy in VoIP Networks: A k-Anonymity Approach [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
- [32] Medical Ethics Privacy Protection Based on Combining Distributed Randomization With K-anonymity [J]. 2015 8th International Congress on Image and Signal Processing (CISP), 2015, : 1577 - 1582
- [34] Balancing between Utility and Privacy for k-Anonymity [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 1 - 8
- [35] K-Anonymity Privacy Protection Using Ontology [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
- [36] Data privacy preservation algorithm with k-anonymity [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
- [37] Methods for Privacy Protection Using K-Anonymity [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
- [39] Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,