On Computational Anonymity
暂无分享,去创建一个
[1] K. Stokes. Combinatorial structures for anonymous database search , 2011 .
[2] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[3] Vicenç Torra,et al. Reidentification and k-anonymity: a model for disclosure risk in graphs , 2012, Soft Comput..
[4] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[5] Josep Domingo-Ferrer,et al. Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.
[6] Josep Domingo-Ferrer,et al. User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..
[7] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] U. M. Feyyad. Data mining and knowledge discovery: making sense out of data , 1996 .
[9] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Marie-Francine Moens,et al. Finding a needle in a haystack: an interactive video archive explorer for professional video searchers , 2011, Multimedia Tools and Applications.
[11] B. Bollobás. Combinatorics: Set Systems, Hypergraphs, Families of Vectors and Combinatorial Probability , 1986 .
[12] Pere Joan Ravetllat Mira,et al. Universitat Rovira i Virgili , 2013 .
[13] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.