Login / Signup
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks.
Zhouxuan Teng
Wenliang Du
Published in:
ICDM (2006)
Keyphrases
</>
privacy preserving
countermeasures
cryptographic algorithms
privacy preserving association rule mining
web services
cooperative
traffic analysis
information retrieval
information security
security protocols
security threats
terrorist attacks