Recovering private data : a comparison of three methods
暂无分享,去创建一个
We examine a recent proposal for data privatization by testing it agalnst three well-known attacks. We show that all three attacks successfully retrieve the original datta. We compare the strengths of the three attacks. Finally, we indicate how the data privatization method examined can be modified to assist it to withstand these attacks.