1. Latanya Sweeney. k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY [J]. IEEE Security & Privacy Magazine, 2002, 10(5):1--14.
2. Truta T M, Vinay B. Privacy Protection: p-Sensitive k-Anonymity Property [C]// International Conference on Data Engineering Workshops, 2006. Proceedings. 2006:94.
3. Y Liu, B Yang, Li Guangyuan. A Personalized Privacy Preserving Parallel (alpha, k)-anonymity Model [J]. International Journal of Advancements in Computing Technology (IJACT), 2012
4. Wang B, Yang J. A personalized privacy anonymous method based on inverse clustering [J]. Tien Tzu Hsueh Pao/acta Electronica Sinica, 2012, 40(5): 883--890.
5. Wang Q, Zeng Z P. (p, a)-sensitive k-anonymity: privacy protection model [J]. Application Research of Computers, 2009, 26(6): 2177--2176.