Journal articles on the topic 'K-Anonymisation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 journal articles for your research on the topic 'K-Anonymisation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Loukides, Grigorios, and Jian-Hua Shao. "An Efficient Clustering Algorithm for k-Anonymisation." Journal of Computer Science and Technology 23, no. 2 (2008): 188–202. http://dx.doi.org/10.1007/s11390-008-9121-3.
Full textNatwichai, Juggapong, Xue Li, and Asanee Kawtrkul. "Incremental processing and indexing for (k, e)-anonymisation." International Journal of Information and Computer Security 5, no. 3 (2013): 151. http://dx.doi.org/10.1504/ijics.2013.055836.
Full textStark, Konrad, Johann Eder, and Kurt Zatloukal. "Achieving k-anonymity in DataMarts used for gene expressions exploitation." Journal of Integrative Bioinformatics 4, no. 1 (2007): 132–44. http://dx.doi.org/10.1515/jib-2007-58.
Full textde Haro-Olmo, Francisco José, Ángel Jesús Varela-Vaca, and José Antonio Álvarez-Bermejo. "Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review." Sensors 20, no. 24 (2020): 7171. http://dx.doi.org/10.3390/s20247171.
Full textZhang, Yuliang, Tinghuai Ma, Jie Cao, and Meili Tang. "K-anonymisation of social network by vertex and edge modification." International Journal of Embedded Systems 8, no. 2/3 (2016): 206. http://dx.doi.org/10.1504/ijes.2016.076114.
Full textSahil bucha. "Balancing Privacy and Utility: Anonymisation Techniques for E-commerce Logistics Data." International Journal of Engineering Research and Science & Technology 17, no. 2 (2021): 65–75. https://doi.org/10.62643/ijerst.v17n2pp.65-75.
Full textGanabathi, G. Chitra, and P. Uma Maheswari. "Efficient clustering technique for k-anonymisation with aid of optimal KFCM." International Journal of Business Intelligence and Data Mining 15, no. 4 (2019): 430. http://dx.doi.org/10.1504/ijbidm.2019.102809.
Full textSingh, Amardeep, Monika Singh, Divya Bansal, and Sanjeev Sofat. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks." International Journal of Information and Computer Security 14, no. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.114706.
Full textSofat, Sanjeev, Divya Bansal, Monika Singh, and Amardeep Singh. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks." International Journal of Information and Computer Security 14, no. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.10037248.
Full textYaji, Sharath, and B. Neelima. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data." International Journal of Big Data Intelligence 5, no. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.092659.
Full textYaji, Sharath, and B. Neelima.B. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data." International Journal of Big Data Intelligence 5, no. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.10008733.
Full textNguyen, Benjamin. "Techniques d’anonymisation." Statistique et société 2, no. 4 (2014): 43–50. https://doi.org/10.3406/staso.2014.933.
Full textMatet, Benoit, Angelo Furno, Marco Fiore, Etienne Côme, and Latifa Oukhellou. "Adaptative generalisation over a value hierarchy for the k-anonymisation of Origin–Destination matrices." Transportation Research Part C: Emerging Technologies 154 (September 2023): 104236. http://dx.doi.org/10.1016/j.trc.2023.104236.
Full textSolanki, Paresh, Sanjay Garg, and Hitesh Chhinkaniwala. "Heuristic-based hybrid privacy-preserving data stream mining approach using SD-perturbation and multi-iterative k-anonymisation." International Journal of Knowledge Engineering and Data Mining 5, no. 4 (2018): 306. http://dx.doi.org/10.1504/ijkedm.2018.095522.
Full textMadan, Suman, and Puneet Goswami. "A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms." International Journal of Intelligent Engineering Informatics 8, no. 1 (2020): 38. http://dx.doi.org/10.1504/ijiei.2020.10027094.
Full textMadan, Suman, and Puneet Goswami. "A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms." International Journal of Intelligent Engineering Informatics 8, no. 1 (2020): 38. http://dx.doi.org/10.1504/ijiei.2020.105433.
Full textBartholomäus, Sebastian, Yannik Siegert, Hans Werner Hense, and Oliver Heidinger. "Secure Linking of Data from Population-Based Cancer Registries with Healthcare Data to Evaluate Screening Programs." Das Gesundheitswesen 82, S 02 (2019): S131—S138. http://dx.doi.org/10.1055/a-1031-9526.
Full textMauw, Sjouke, Yunior Ramírez-Cruz, and Rolando Trujillo-Rasua. "Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation." Knowledge and Information Systems 64, no. 4 (2022): 1077–100. http://dx.doi.org/10.1007/s10115-022-01662-z.
Full textMatet, Benoit, Angelo Furno, Marco Fiore, Etienne Come, and Latifa Oukhellou. "Adaptative Generalisation Over a Value Hierarchy for the K-Anonymisation of Origin-Destination Matrices." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4273504.
Full textAlmeida, João Rafael, João Paulo Barraca, and José Luís Oliveira. "Preserving Privacy when Querying OMOP CDM Databases." Studies in Health Technology and Informatics, July 1, 2022. https://doi.org/10.3233/SHTI220930.
Full textRen, Wang, Xin Tong, Jing Du, et al. "Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation." Information Systems Frontiers, May 11, 2021. http://dx.doi.org/10.1007/s10796-021-10116-w.
Full textAntonio, Landi, Capparelli Esperanza Patricia Francesco, Finocchiaro Giulia, Pini Sofia, and PCP PREVENT. "Anonymisation and Pseudonymisation as Solutions for the Protection of Personal Data (PREVENT PCP project)." Diritto, Economia e Tecnologie della Privacy" January 2024 (January 12, 2024). https://doi.org/10.5281/zenodo.14184904.
Full text"Preservation of Privacy using Multidimensional K-Anonymity Method for Non-Relational Data." International Journal of Recent Technology and Engineering 8, no. 2S10 (2019): 544–47. http://dx.doi.org/10.35940/ijrte.b1096.0982s1019.
Full textLu, Yang. "Semantic-based Privacy-preserving Record Linkage." International Journal of Population Data Science 7, no. 3 (2022). http://dx.doi.org/10.23889/ijpds.v7i3.1956.
Full textAvraam, Demetris, Elinor Jones, and Paul Burton. "A deterministic approach for protecting privacy in sensitive personal data." BMC Medical Informatics and Decision Making 22, no. 1 (2022). http://dx.doi.org/10.1186/s12911-022-01754-4.
Full textO’Keefe, Christine M. "Privacy, Governance and Public Acceptability in Population Data Linkage for Research." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.405.
Full text