k-anonymity
k-anonymity copied to clipboard
Evaluating variety of k-Anonymity techniques.
Results
1
k-anonymity issues
Sort by
recently updated
recently updated
newest added
Is km-anonymity a little bit different from k-anonymity ?