Sciweavers

152 search results - page 10 / 31
» Anonymous k -Show Credentials
Sort
View
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
15 years 3 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay
ASIACRYPT
2004
Springer
15 years 3 months ago
k-Times Anonymous Authentication (Extended Abstract)
Isamu Teranishi, Jun Furukawa, Kazue Sako
WISA
2004
Springer
15 years 3 months ago
A New k-Anonymous Message Transmission Protocol
Gang Yao, Dengguo Feng
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
14 years 10 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...