Search

Your search keyword '"Data anonymity"' showing total 38 results

Search Constraints

Start Over You searched for: Descriptor "Data anonymity" Remove constraint Descriptor: "Data anonymity"
38 results on '"Data anonymity"'

Search Results

2. Apache Flink and clustering-based framework for fast anonymization of IoT stream data

3. Data and Location Privacy of Smart Devices over Vehicular Cloud Computing

4. Deceptive Infusion of Data: A Novel Data Masking Paradigm for High-Valued Systems.

5. A dynamic anonymization privacy-preserving model based on hierarchical sequential three-way decisions.

6. Efficient Q-Value Zero-Leakage Protection Scheme in SRS Regularly Publishing Private Data

7. Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences

8. Data Privacy against Composition Attack

9. Anonymity and Application Privacy in Context of Mobile Computing in eHealth

10. Collecting network data from documents to reach non-participatory populations

11. Data Re-Identification—A Case of Retrieving Masked Data from Electronic Toll Collection

13. Data anonymity and truthfulness

14. Providing data anonymity for a secure database infrastructure.

15. Inference Detection and Database Security for a Business Environment.

16. Secure Data Management Technology

17. A Probabilistic Perspective on Re-Identifiability.

18. Data obfuscation: anonymity and desensitization of usable data sets.

19. Efficient Q-Value Zero-Leakage Protection Scheme in SRS Regularly Publishing Private Data

20. MR-Anonymization: A Relationship-based Privacy Model

21. Privacy Preservation Using Various Anonymity Models

22. Data Anonymity in the FOO Voting Scheme.

23. Research progress of anonymous data release

24. $$\delta $$-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining

25. Embrace data anonymity, not ‘digital consent’

26. Carbon Heroes Benchmark Program – whole building embodied carbon profiling

27. Scalable Distributed Two-Layer Datastore Providing Data Anonymity

28. Data Anonymity Decision

29. Quality control program: the radiology technician approach

30. Data Re-Identification—A Case of Retrieving Masked Data from Electronic Toll Collection.

31. A Framework for the Secure Storage of Data Generated in the IoT

32. Privacy preserving for Big Data Analysis

33. Providing Group Anonymity Using Wavelet Transform

34. Data Anonymity in Multi-Party Service Model

35. Privacy Inference Disclosure Control with Access-Unrestricted Data Anonymity

36. A cloud-based optimal fuzzy clustering of distributed data

38. Evaluating the risk of re-identification of patients from hospital prescription records

Catalog

Books, media, physical & digital resources