Author:
Bredereck Robert,Nichterlein André,Niedermeier Rolf,Philip Geevarghese
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. ACM Trans. Algorithms 6(3), 1–19 (2010)
2. Lecture Notes in Computer Science;G. Aggarwal,2005
3. Lecture Notes in Computer Science;J. Blocki,2010
4. Bonizzoni, P., DellaVedova, G., Dondi, R.: Anonymizing binary and small tables is hard to approximate. J. Comb. Optim. 22, 97–119 (2011)
5. Lecture Notes in Computer Science;P. Bonizzoni,2011
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy-Preserving Cryptographic Model for Big Data Analytics;Services and Business Process Reengineering;2021
2. Standardization of Big Data and Its Policies;Services and Business Process Reengineering;2021
3. Big Data Hadoop: Security and Privacy;SSRN Electronic Journal;2019
4. Securing Big Data Efficiently through Microaggregation Technique;2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW);2017-06
5. Big data privacy: a technological perspective and review;Journal of Big Data;2016-11-26