共 50 条
- [2] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection 2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
- [4] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
- [6] K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02): : 1495 - 1510
- [7] K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing Cluster Computing, 2023, 26 : 1495 - 1510
- [8] Investigation on Privacy Preserving using K-Anonymity Techniques 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 318 - 324
- [9] Multi-Level Privacy Preserving K-Anonymity 2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 61 - 67