|
Volumn , Issue , 2006, Pages 1091-1096
|
Comparisons of K-anonymization and randomization schemes under linking attacks
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CONFIDENTIALITY MAP;
RANDOMIZATION SCHEMES;
DATA MINING;
DATA RECORDING;
INFORMATION RETRIEVAL;
RANDOM PROCESSES;
RISK MANAGEMENT;
DATA PRIVACY;
|
EID: 42149134082
PISSN: 15504786
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICDM.2006.40 Document Type: Conference Paper |
Times cited : (12)
|
References (9)
|