Distributed Denial of Privacy
暂无分享,去创建一个
[1] Matthias Hemmje,et al. From Integrated Publication and Information Systems to Information and Knowledge Environments , 2005 .
[2] Daniel Kifer,et al. Injecting utility into anonymized datasets , 2006, SIGMOD Conference.
[3] Dirk Timmermann,et al. Adaptive clustering for device free user positioning utilizing passive RFID , 2013, UbiComp.
[4] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[5] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[7] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[8] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[9] José L. Encarnação,et al. Ambient Intelligence: Towards Smart Appliance Ensembles , 2005, From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments.
[10] Ninghui Li,et al. Slicing: A New Approach for Privacy Preserving Data Publishing , 2009, IEEE Transactions on Knowledge and Data Engineering.