Report copyright - Anonymization-Based Attacks in Privacy-Preserving Data ...jpei/publications/Anonymization-attacks-TO… · studied approach is the k-anonymity model [Ciriani et al. 2007] which in
Please pass captcha verification before submit form
Please pass captcha verification before submit form