Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    KK-Anonymization-Based Temporal Attack Risk Detection Using Machine Learning Paradigms

  • articleNo Access

    A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services

  • articleNo Access

    SHORTEST PATHS ANONYMIZATION ON WEIGHTED GRAPHS

  • articleNo Access

    MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES

  • articleNo Access

    A FORMALIZATION OF RECORD LINKAGE AND ITS APPLICATION TO DATA PROTECTION

  • articleNo Access

    Genetic grey wolf optimization and C-mixture for collaborative data publishing

  • chapterNo Access

    The k-anonymity approach for data-publishing based on clustering partition