An Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint Rules

An Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint Rules

This item appears in the following Collection(s)

Search Repository


My Account

Statistics