AMV: A k-anonymization technique minimizing the cloaking region
Doohee Song, Minjae Heo, Jongwon Sim, Sori Hwang, Moonbae Song, Kwangjin Park, Journal of Internet Computing and Services, Vol. 15, No. 6, pp. 9-14, Dec. 2014
10.7472/jksii.2014.15.6.09, Full Text:
Keywords: cloaking, k-anonymization, location based service, spatial data, Privacy
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Song, D., Heo, M., Sim, J., Hwang, S., Song, M., & Park, K. (2014). AMV: A k-anonymization technique minimizing the cloaking region. Journal of Internet Computing and Services, 15(6), 9-14. DOI: 10.7472/jksii.2014.15.6.09.
[IEEE Style]
D. Song, M. Heo, J. Sim, S. Hwang, M. Song, K. Park, "AMV: A k-anonymization technique minimizing the cloaking region," Journal of Internet Computing and Services, vol. 15, no. 6, pp. 9-14, 2014. DOI: 10.7472/jksii.2014.15.6.09.
[ACM Style]
Doohee Song, Minjae Heo, Jongwon Sim, Sori Hwang, Moonbae Song, and Kwangjin Park. 2014. AMV: A k-anonymization technique minimizing the cloaking region. Journal of Internet Computing and Services, 15, 6, (2014), 9-14. DOI: 10.7472/jksii.2014.15.6.09.