共 50 条
- [21] K-Anonymity Based on Sensitive Tuples FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 91 - +
- [22] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
- [23] An Adaptive Learning Model for k-Anonymity Location Privacy Protection IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
- [24] An Improved Location-Based Service Authentication Algorithm with Personalized K-Anonymity CHINA SATELLITE NAVIGATION CONFERENCE (CSNC) 2016 PROCEEDINGS, VOL I, 2016, 388 : 257 - 266
- [25] The Analysis of Typical Algorithms Based on K-Anonymity INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 327 - 330
- [26] K-Anonymity Algorithm Based on Improved Clustering ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476
- [27] A Distributed k-Anonymity Protocol for Location Privacy 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
- [29] Minimum Spanning Tree Based k-Anonymity PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 405 - 413