An Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint Rules

Files in this item

This item appears in the following Collection(s)

Search Repository


My Account

Statistics