共 50 条
- [41] Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 289 - 293
- [42] Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT [J]. 2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2019,
- [43] Investigation on Privacy Preserving using K-Anonymity Techniques [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 318 - 324
- [44] k-Anonymity on Graphs Using the Szemerdi Regularity Lemma [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1283 - 1292
- [45] A Semantic-Based K-Anonymity Scheme for Health Record Linkage [J]. INTEGRATING AND CONNECTING CARE, 2017, 239 : 84 - 90
- [46] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
- [47] Dummy Location Selection Scheme for K-anonymity in Location based Services [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 441 - 448
- [50] A Scheme for Three-way Secure and Verifiable E-Voting [J]. 2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,