PERTURBATION-BASED ORDER PRESERVING PSEUDONYMIZATION OF DATA

作者: Martin Luther , Roake Timothy

DOI:

关键词:

摘要: A technique includes converting a plurality of plaintext values to corresponding pseudonym values. The conversion performing encryption the provide second values; perturbing and controlling cause an ordering be represented in

参考文章(3)
Ye Tian, Junsong Zhang, Yazhi Liu, Xiong Li, Jian Ma, Privacy protection for participatory sensing system ,(2012)
Yannick Saillet, Sebastian Nelke, Martin A. Oberhofer, Jens Seifert, Generation of analysis reports using trusted and public distributed file systems ,(2015)