共 24 条
[1]
[Anonymous], 2014, TECH REP
[2]
Castle:: A delay-constrained scheme for ks-anonymizing data streams
[J].
2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3,
2008,
:1376-+
[3]
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
[6]
Ghinita Gabriel, 2007, VLDB, V07, P758
[10]
LeFevre Kristen., 2006, ICDE, DOI DOI 10.1109/ICDE.2006.101