Author:
Punithavathi S.,Jeyalaksshmi S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference20 articles.
1. Ram Mohan Rao P, Murali Krishna S, Siva Kumar AP. Privacy preservation techniques in big data analytics: a survey. J Big Data. 2018;5(33):1–12.
2. Liu X, Wang Z, Jin C, Li F, Li G. A blockchain-based medical data sharing and protection scheme. IEEE Access. 2019;7:118943–53.
3. Cha S, Baek S, Kim S. Blockchain-based sensitive data management by using key escrow encryption system from the perspective of supply chain. IEEE Access. 2020;8:154269–80.
4. Hua Y, Li Z, Wang B, Li J. A method for solving quasi-identifiers of single structured relational data. IEEE Access. 2021;9:166293–302.
5. Sei Y, Okumura H, Takenouchi T, Ohsuga A. Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness. IEEE Trans Depend Secure Comput. 2019;16(4):580–93.