搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: LATANYA SWEENEY
DOI: 10.1142/S0218488502001648
关键词:
摘要: … protection model named k-anonymity and a set of accompanying policies for deployment. A release provides k-anonymity protection if … that adhere to k-anonymity unless accompanying …
,2004, 引用: 6
pacific asia workshop on intelligence and security informatics,2013, 引用: 2
conference on e business technology and strategy,2012, 引用: 4
Lecture Notes in Computer Science,2012, 引用: 58
privacy enhancing technologies,2012, 引用: 4
,2010, 引用: 1
Lecture Notes in Information Systems and Organisation,2014, 引用: 2
,2013, 引用: 0
international conference information security theory and practice,2012, 引用: 2
Brain Informatics,2011, 引用: 0