共 4 条
[2]
A secure distributed framework for achieving k -anonymity[J] . Wei Jiang,Chris Clifton.The VLDB Journal . 2006 (4)
[3]
Handicapping attacker's confidence: an alternative to k -anonymization[J] . Ke Wang,Benjamin C. M. Fung,Philip S. Yu.Knowledge and Information Systems . 2007 (3)
[4]
Source-location privacy in energy constrained sensor networks routing .2 Ozturk C,Zhang Y,Trappe W. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works(SASN) . 2004