Login / Signup

How Anonymous Is k-Anonymous? Look at Your Quasi-ID.

Claudio BettiniXiaoyang Sean WangSushil Jajodia
Published in: Secure Data Management (2008)
Keyphrases
  • payment scheme
  • digital signature scheme
  • databases
  • data mining
  • knowledge base
  • multiscale
  • information technology
  • peer to peer