Inviting an author to review:
Find an author and click ‘Invite to review selected article’ near their name.
Search for authorsSearch for similar articles
18
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      From t-Closeness-Like Privacy to Postrandomization via Information Theory

      Read this article at

      ScienceOpenPublisher
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references14

          • Record: found
          • Abstract: not found
          • Article: not found

          Communication Theory of Secrecy Systems*

          C. Shannon (1949)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The Wire-Tap Channel

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Protecting respondents identities in microdata release

                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Knowledge and Data Engineering
                IEEE Trans. Knowl. Data Eng.
                Institute of Electrical and Electronics Engineers (IEEE)
                1041-4347
                November 2010
                November 2010
                : 22
                : 11
                : 1623-1636
                Article
                10.1109/TKDE.2009.190
                a6eebe7e-acd6-45a3-bb45-a86d45faf3ff
                © 2010
                History

                Comments

                Comment on this article