Results 251 to 260 of about 12,445,360 (313)
Some of the next articles are maybe not open access.

Drone Helps Privacy: Sky Caching Assisted $k$-Anonymity in Spatial Querying

IEEE Systems Journal, 2022
As wireless and mobile devices are prevalent and resource-rich, users can frequently query point-of-interests and enjoy diverse location-based services (LBSs) in infrastructure-based wireless networks.
Hema Naga Sai Sudha Jagarlapudi   +4 more
semanticscholar   +1 more source

An Effective Location Privacy-Preserving K-anonymity Scheme in Location Based Services

2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI), 2021
With the development of global positioning systems, communication technologies, the Internet and mobile terminals, location-based services (LBS) have become increasingly widely used.
Haoyu Liu   +4 more
semanticscholar   +1 more source

k-Anonymous data collection

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhong, Sheng   +2 more
openaire   +1 more source

Multi-Level Privacy Preserving K-Anonymity

Asia Joint Conference on Information Security, 2021
k-anonymity is a well-known definition of privacy, which guarantees that any person in the released dataset cannot be distinguished from at least k-1 other individuals.
J. Weng, Po-Wen Chi
semanticscholar   +1 more source

Thoughts on k-Anonymization

22nd International Conference on Data Engineering Workshops (ICDEW'06), 2006
k-Anonymity is a method for providing privacy protection by ensuring that data cannot be traced to an individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. To achieve optimal and practical k-anonymity, recently, many different kinds of algorithms with various assumptions and restrictions have been proposed with ...
M. Ercan Nergiz, Chris Clifton
openaire   +1 more source

($k$,$��$)-Anonymity: $k$-Anonymity with $��$-Differential Privacy

2017
The explosion in volume and variety of data offers enormous potential for research and commercial use. Increased availability of personal data is of particular interest in enabling highly customised services tuned to individual needs. Preserving the privacy of individuals against reidentification attacks in this fast-moving ecosystem poses significant ...
Holohan, Naoise   +3 more
openaire   +1 more source

(α, k)-anonymity

Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 2006
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the association of individuals to sensitive information.
Raymond Chi-Wing Wong   +3 more
openaire   +2 more sources

k-Anonymization Revisited

2008 IEEE 24th International Conference on Data Engineering, 2008
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-anonymization: an adversary who knows the public data of an individual cannot link that individual to less than k records in the anonymized table. Every anonymized table that
Aristides Gionis   +2 more
openaire   +1 more source

Energy cost and accuracy impact of k-anonymity

ICT for Sustainability, 2022
European Union has aggregated the current societal concerns into two seemingly orthogonal directions: the Green Deal and the GDPR. In this paper, we begin to analyse trade-offs in preserving privacy, learning from the data, and saving energy ...
Ana Oprescu   +2 more
semanticscholar   +1 more source

Privacy-Aware and AI Techniques for Healthcare Based on K-Anonymity Model in Internet of Things

IEEE transactions on engineering management
The government and industry have given the recent development of the Internet of Things in the healthcare sector significant respect. Health service providers retain data gathered from many sources and are useful for patient diagnostics and research for ...
A. K. Sangaiah   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy