Learn More
With the increase in online publishing of social network data the requirement to protect confidential information related to users has become the main concern of publishers. To cater to this need many anonymization techniques like K-anonymity, L-diversity and T-closeness has been proposed by various researchers for micro-data as well as social network data.(More)
The self-organizing nature of the Mobile Ad hoc Networks (MANETs) provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in(More)
  • 1