Practical anonymization for data streams: z-anonymity and relation with k-anonymity (original) (raw)

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.