Report copyright - Anonymization-based attacks in privacy-preserving data ...adafu/Pub/TODS2009.pdf · studied approach is the k-anonymity model [Ciriani et al. 2007] which in turn led to other models
Please pass captcha verification before submit form