Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Bhawani Shanker Bhati"'
Publikováno v:
IEEE Access, Vol 9, Pp 23608-23623 (2021)
In this article, we propose a $k$ -anonymity approach that prioritizes the generalization of attributes based on their utility. We focus on transport data, which we consider a special case in which many or all attributes are quasi-identifiers (e.g.,
Externí odkaz:
https://doaj.org/article/be546899aae74d89bc49056914d9ff3f
Autor:
Andrea Lacava, Michele Polese, Rajarajan Sivaraj, Rahul Soundrarajan, Bhawani Shanker Bhati, Tarunjeet Singh, Tommaso Zugno, Francesca Cuomo, Tommaso Melodia
Publikováno v:
IEEE Transactions on Mobile Computing. :1-16
5G and beyond mobile networks will support heterogeneous use cases at an unprecedented scale, thus demanding automated control and optimization of network functionalities customized to the needs of individual users. Such fine-grained control of the R
Publikováno v:
IEEE Access, Vol 9, Pp 23608-23623 (2021)
In this paper, we propose a k-anonymity approach that prioritizes the generalization of attributes based on their utility. We focus on transport data, which we consider a special case in which many or all attributes are quasi-identifiers (e.g., origi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::44a4d297b80b2bdcf2389b5e8256bd60
https://mediatum.ub.tum.de/1633503
https://mediatum.ub.tum.de/1633503
Publikováno v:
International Journal of Wireless Information Networks. 25:30-43
The openness of a Mobile Adhoc network (MANET) makes it vulnerable to various attacks that can breach privacy, and this demands a privacy protection system. In this paper, we propose a privacy protection system with flexible and adaptable policies to
Publikováno v:
Wireless Personal Communications. 97:4063-4086
Mobile adhoc networks consists of large number of mobile nodes, and is usually deployed to transfer data from a sender to a receiver using multi-hop routing. The data being transmitted may contain sensitive information, and undesired disclosure of in
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
In stock market, the data contain sensitive information, and undesired disclosure of this information can lead to various attacks, thus breaching privacy and causing severe damage to the users. We propose a data privacy preservation scheme within sto
Publikováno v:
WorldCIS
Data privacy is one among the challenging issues in Mobile Adhoc NETworks (MANETs), which are deployed in hostile environments to transfer sensitive data through multi-hop routing. The undesired disclosure of data can result in breach of data privacy