Showing 21 - 40 results of 426 for search '"Anonymity"', query time: 0.06s Refine Results
  1. 21
  2. 22

    Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing by Sindhe Phani Kumar, R. Anandan

    Published 2022-01-01
    “…More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
    Get full text
    Article
  3. 23

    An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs by Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang

    Published 2013-01-01
    “…In this paper, we present an anonymous remote user authentication with key agreement scheme for multi-server architecture employing self-certified public keys without pairings. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26

    Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility by Roland Stenger, Steffen Busse, Jonas Sander, Thomas Eisenbarth, Sebastian Fudickar

    Published 2025-01-01
    “…Data anonymization is an essential prerequisite that enables data sharing in a privacy-preserving manner. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29

    Corrections to “Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook” by Abdul Majeed, Safiullah Khan, Seong Oun Hwang

    Published 2025-01-01
    “…Presents corrections to the paper, Corrections to “Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook”.…”
    Get full text
    Article
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39

    Open Data Release and Privacy Concerns: Complexity in Mitigating Vulnerability with Controlled Perturbation by Shah Imran Alam, Ihtiram Raza Khan, Syed Imtiyaz Hassan, Farheen Siddiqui, M. Afshar Alam, Anil Kumar Mahto

    Published 2021-01-01
    “…Such anonymity-preserving algorithms argue and compete in objectivethat not only could the released anonymized data preserve privacy but also the anonymized data preserve the required level of quality. …”
    Get full text
    Article
  20. 40

    An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge by Zhiqiang Ruan, Wei Liang, Decai Sun, Haibo Luo, Fanyong Cheng

    Published 2013-04-01
    “…The source packet is randomly forwarded within and between the groups with elaborate design to ensure communication anonymity; furthermore, members of each group exchange encrypted traffic of constant packet length to make it difficult for the adversary to trace back. …”
    Get full text
    Article