Author of the publication

A Personalized Extended (a, k)-Anonymity Model.

, , and . CBD, page 234-240. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks., , , and . I. J. Network Security, 18 (5): 816-831 (2016)A Novel User Model Based on Searchable Encryption Scheme., , and . CBD, page 247-253. IEEE Computer Society, (2015)Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data., , and . CBD, page 200-206. IEEE, (2016)Flexibly and Securely Shape Your Data Disclosed to Others., , , , , and . AsiaCCS, page 160-167. ACM, (2019)A Personalized Extended (a, k)-Anonymity Model., , and . CBD, page 234-240. IEEE Computer Society, (2015)A prediction model of substrates and non-substrates of breast cancer resistance protein (BCRP) developed by GA-CG-SVM method., , , , , , , and . Comp. in Bio. and Med., 41 (11): 1006-1013 (2011)Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data., and . Sensors, 16 (12): 1993 (2016)A High Capacity Information Hiding Algorithm Based on Invariance Properties of JPEG Compression., , and . JCP, 5 (12): 1925-1932 (2010)An improved early detection method of type-2 diabetes mellitus using multiple classifier system., , and . Inf. Sci., (2015)Is Data Privacy Always Good for Software Testing?, , , and . ISSRE, page 368-377. IEEE Computer Society, (2010)