Author:
Mohapatra Debasis,Patra Manas Ranjan
Reference10 articles.
1. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 71–588 (2002)
2. Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation, pp. 139–150. VLDB (2006)
3. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-Diversity: privacy beyond k-anonymity. ICDE (2006)
4. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: IEEE International Conference on Data Engineering (ICDE), pp. 106–115 (2007)
5. Mohapatra, D., Patra M.R.: k-degree closeness anonymity: a centrality measure based approach for network anonymization, pp. 299–310. ICDCIT (2015)