搜索结果: 1-4 共查到“工学 anonymity”相关记录4条 . 查询时间(0 秒)
An Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint Rules
Data Privacy Utility K-Anonymity
2015/5/26
As medical data continues to transition to electronic formats, opportunities arise for researchers to use this microdata to discover patterns and increase knowledge that can improve patient care. Now ...
k-anonymity based framework for privacy preserving data collection in wireless sensor networks
Anonymity Wireless Sensor Networks Data Privacy
2010/10/12
In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security framework with two levels of privacy. A base level of privacy is provided for the data shared wi...
Privacy and Anonymity Management in Electronic Voting
Privacy Anonymity Management Electronic Voting
2010/9/25
Security issues have to be considered when an electoral process isdone electronically. Among them, one of the most important is voterprivacy. Voter privacy is a requirement which is difficult to fulfi...
Since the inception of malware, the primary objective of its authorshas been to either hide or camouflage their identities and locations inthe Internet. To do this, attackers use traditional technique...