Sciweavers

382 search results - page 1 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
64
Voted
IJUFKS
2002
40views more  IJUFKS 2002»
14 years 11 months ago
k-Anonymity: A Model for Protecting Privacy
Latanya Sweeney
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
15 years 6 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay
TMC
2008
159views more  TMC 2008»
14 years 10 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
16 years 8 days ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta