Login / Signup
How Anonymous Is k-Anonymous? Look at Your Quasi-ID.
Claudio Bettini
Xiaoyang Sean Wang
Sushil Jajodia
Published in:
Secure Data Management (2008)
Keyphrases
</>
payment scheme
digital signature scheme
databases
data mining
knowledge base
multiscale
information technology
peer to peer