Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Research progress on multiple releases publishing of privacy preserving.

  • Source: Application Research of Computers / Jisuanji Yingyong Yanjiu. Dec2014, Vol. 31 Issue 12, p3527-3530. 4p.

تفاصيل العنوان

×
Academic Journal

New based on (p+, α)-sensitive k-anonymity enhanced privacy protection model.

  • Source: Application Research of Computers / Jisuanji Yingyong Yanjiu. Nov2014, Vol. 31 Issue 11, p3465-3468. 4p.

تفاصيل العنوان

×
Academic Journal

Express information protection application based on K-anonymity.

  • Source: Application Research of Computers / Jisuanji Yingyong Yanjiu. Feb2014, Vol. 31 Issue 2, p555-567. 4p.

تفاصيل العنوان

×
Academic Journal

Privacy-preserving online transaction scheme based on ElGamal signature.

  • Source: Application Research of Computers / Jisuanji Yingyong Yanjiu. Dec2014, Vol. 31 Issue 12, p3707-3710. 4p.

تفاصيل العنوان

×
Academic Journal

Does fair anonymization exist?

  • Source: International Review of Law, Computers & Technology. Mar2014, Vol. 28 Issue 1, p21-44. 24p.

تفاصيل العنوان

×
  • 1-10 ل  10 نتائج ل ""Data protection""