PRIVE
- 8 May 2007
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 371-380
- https://doi.org/10.1145/1242572.1242623
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- A peer-to-peer spatial cloaking algorithm for anonymous location-based servicePublished by Association for Computing Machinery (ACM) ,2006
- Personalized privacy preservationPublished by Association for Computing Machinery (ACM) ,2006
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- Data Privacy through Optimal k-AnonymizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Chord: a scalable peer-to-peer lookup protocol for internet applicationsIEEE/ACM Transactions on Networking, 2003
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Scalable application layer multicastPublished by Association for Computing Machinery (ACM) ,2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001