Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,032,019 papers from all fields of science
Search
Sign In
Create Free Account
Data anonymization
Known as:
Anonymization
, Data anonymisation
Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of either encrypting or removing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
De-anonymization
De-identification
Differential privacy
Encryption
Expand
Broader (1)
Information privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Andreas Reiter
,
Bernd Prünster
,
Thomas Zefferer
IEEE/ACM International Symposium on Cluster…
2017
Corpus ID: 25141976
Many different technologies fostering and supporting distributed and decentralized computing scenarios emerged recently. Edge…
Expand
2016
2016
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers
J. H. Jafarian
,
Amirreza Niakanlahiji
,
E. Al-Shaer
,
Qi Duan
MTD@CCS
2016
Corpus ID: 207243877
While existing proactive-based paradigms such as address mutation are effective in slowing down reconnaissance by naive attackers…
Expand
2015
2015
A Privacy-Preserving Continuous Location Monitoring System for Location-Based Services
D. Song
,
J. Sim
,
Kwangjin Park
,
MoonBae Song
Int. J. Distributed Sens. Networks
2015
Corpus ID: 35582581
To protect users’ private locations in location-based services, various location anonymization techniques have been proposed. The…
Expand
2013
2013
De-Anonymizing Users Across Heterogeneous Social Computing Platforms
M. Korayem
,
David J. Crandall
International Conference on Web and Social Media
2013
Corpus ID: 1691134
Many people use multiple online and social computing platforms, and choose to share varying amounts of personal information…
Expand
2013
2013
Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network
A. Gurjar
,
A. R. Patil
International Conference on Communication Systems…
2013
Corpus ID: 18139473
In many real life applications, the locations of events monitored by the network are required to remain anonymous. Preserving…
Expand
2011
2011
Tor is unfair — And what to do about it
Florian Tschorsch
,
Björn Scheuermann
IEEE Conference on Local Computer Networks
2011
Corpus ID: 15115465
Tor is one of the most popular network anonymization services. With increasing popularity, however, Tor is also faced with…
Expand
2011
2011
Privacy-preserving publishing microdata with full functional dependencies
Wendy Hui Wang
,
Ruilin Liu
Data & Knowledge Engineering
2011
Corpus ID: 15512146
Highly Cited
2009
Highly Cited
2009
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
Ian Molloy
,
Ninghui Li
,
Tiancheng Li
Ninth IEEE International Conference on Data…
2009
Corpus ID: 16963510
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be…
Expand
Highly Cited
2007
Highly Cited
2007
Capturing data usefulness and privacy protection in K-anonymisation
Grigorios Loukides
,
J. Shao
ACM Symposium on Applied Computing
2007
Corpus ID: 14585923
K-anonymisation is an approach to protecting privacy contained within a data set. A good k-anonymisation algorithm should…
Expand
2002
2002
Policing Property and Moral Risk Through Promotions, Anonymization and Rewards: Crime Stoppers Revisited
Randy K. Lippert
2002
Corpus ID: 144150654
This article explores promotions, anonymity and rewards as techniques of governance in Canadian Crime Stoppers (CS) programmes by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE