1. On k-anonymity and the curse of dimensionality;Aggarwal,2005
2. k-anonymous message transmission;Ahn,2003
3. Data privacy through optimal k-anonymization;Bayardo,2005
4. Efficient k-anonymization using clustering techniques advances in databases: concepts, systems and applications;Byun,2007
5. New receipt-free voting scheme using double-trapdoor commitment;Chen;Information Sciences,2011