The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things
暂无分享,去创建一个
Yong Bai | Mengxing Huang | Zhuhua Hu | Mingshan Xie | Mengxing Huang | Zhuhua Hu | Yong Bai | Mingshan Xie
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Raymond Chi-Wing Wong,et al. (α, k)-anonymous data publishing , 2009, Journal of Intelligent Information Systems.
[3] Bhushan Trivedi,et al. Hybrid intelligent access control framework to protect data privacy and theft , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[4] Hamada H. Ghenniwa,et al. Ambient Systems , Networks and Technologies ( ANT 2015 ) Privacy in Internet of Things : A Model and Protection Framework , 2015 .
[5] S. Landau. Control use of data to protect privacy , 2015, Science.
[6] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[8] Ashok V. Sutagundar,et al. Data Management in Internet of Things , 2017 .
[9] Albert Levi,et al. k-anonymity based framework for privacy preserving data collection in wireless sensor networks , 2010, Turkish Journal of Electrical Engineering and Computer Sciences.
[10] Wei Jiang,et al. Property-Based Anonymous Attestation in Trusted Cloud Computing , 2014, J. Electr. Comput. Eng..
[11] Sead Muftic,et al. Business Information Exchange System with Security, Privacy, and Anonymity , 2016, J. Electr. Comput. Eng..
[12] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[13] Samir Khuller,et al. Achieving anonymity via clustering , 2006, PODS '06.
[14] Seung-Soo Shin,et al. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services , 2015, Wireless Personal Communications.
[15] Xavier Hesselbach,et al. Innovative Techniques for Power Consumption Saving in Telecommunication Networks , 2014, J. Electr. Comput. Eng..