Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,394,721 papers from all fields of science
Search
Sign In
Create Free Account
Data anonymization
Known as:
Anonymization
, Data anonymisation
Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of either encrypting or removing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
De-anonymization
De-identification
Differential privacy
Encryption
Expand
Broader (1)
Information privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Andreas Reiter
,
Bernd Prünster
,
Thomas Zefferer
IEEE/ACM International Symposium on Cluster…
2017
Corpus ID: 25141976
Many different technologies fostering and supporting distributed and decentralized computing scenarios emerged recently. Edge…
Expand
2015
2015
A Privacy-Preserving Continuous Location Monitoring System for Location-Based Services
D. Song
,
J. Sim
,
Kwangjin Park
,
MoonBae Song
Int. J. Distributed Sens. Networks
2015
Corpus ID: 35582581
To protect users’ private locations in location-based services, various location anonymization techniques have been proposed. The…
Expand
2013
2013
De-Anonymizing Users Across Heterogeneous Social Computing Platforms
M. Korayem
,
David J. Crandall
International Conference on Web and Social Media
2013
Corpus ID: 1691134
Many people use multiple online and social computing platforms, and choose to share varying amounts of personal information…
Expand
2013
2013
Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network
A. Gurjar
,
A. R. Patil
International Conference on Communication Systems…
2013
Corpus ID: 18139473
In many real life applications, the locations of events monitored by the network are required to remain anonymous. Preserving…
Expand
2011
2011
Tor is unfair — And what to do about it
Florian Tschorsch
,
Björn Scheuermann
IEEE Conference on Local Computer Networks
2011
Corpus ID: 15115465
Tor is one of the most popular network anonymization services. With increasing popularity, however, Tor is also faced with…
Expand
2011
2011
Privacy-preserving publishing microdata with full functional dependencies
Wendy Hui Wang
,
Ruilin Liu
Data & Knowledge Engineering
2011
Corpus ID: 15512146
Highly Cited
2009
Highly Cited
2009
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
Ian Molloy
,
Ninghui Li
,
Tiancheng Li
Ninth IEEE International Conference on Data…
2009
Corpus ID: 16963510
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be…
Expand
2008
2008
Cross-layer attack on anonymizing networks
A. Panchenko
,
L. Pimenidis
International Conference on Telecommunications
2008
Corpus ID: 41598873
Network layer anonymization protects only some of the userpsilas personal identification information, namely network addresses of…
Expand
2004
2004
Prefix-preserving IP address anonymization
Jinliang Fan
,
J. Xu
,
M. Ammar
,
S. Moon
2004
Corpus ID: 59654566
2002
2002
Policing Property and Moral Risk Through Promotions, Anonymization and Rewards: Crime Stoppers Revisited
Randy K. Lippert
2002
Corpus ID: 144150654
This article explores promotions, anonymity and rewards as techniques of governance in Canadian Crime Stoppers (CS) programmes by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE