Privacy and anonymity
Security Protocols with Privacy and Anonymity of Users
10
Maintaining Location Privacy and Anonymity for Vehicle’s Drivers in VANET
33
ACHIEVING USER PRIVACY AND ANONYMITY IN WIRELESS MESH NETWORKS USING ANONYMOUS PROTOCOL
7
Privacy in the Digital Age of Encryption and Anonymity Online
7
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
6
Enhancing the privacy of e-learning systems with alias and anonymity
12
A K Anonymity Based Schema for Location Privacy Preservation
13
Achieving k Anonymity Privacy Protection using Agents
6
Survey on Data Privacy in Big Data with K- Anonymity
7
Modified Anonymity Model for Privacy Preserving Data Mining
7
Increasing Data Anonymity using AES and Privacy Technique
6
Trajectory Privacy in Participatory Sensing using K-anonymity
7
Distributed Privacy preserving and Handling Privacy information leakage by using k anonymity algorithm
9
Privacy Preservation in Data Centric Environment using K Anonymity
8
S-KACA Anonymity Privacy Protection Based on Clustering Algorithm
7
Trajectory Rotation Privacy Protection Algorithm Based on k Anonymity
12
Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet. Contents
16
Preserving Privacy in Social Networking Systems: Policy-Based Control and Anonymity
120
A new anonymity-based protocol preserving privacy based cloud environment
6
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
14