2018
DOI: 10.1007/978-981-10-7641-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Research Issue in Data Anonymization in Electronic Health Service: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…However, this technique is vulnerable to a similarity attack [2,31,32]. A similarity attack occurs when values within an equivalence class are the same or even when there is a semantic significance between distinct sensitive values in the same equivalence class [23,34]. erefore, an adversary can deduce the different possibilities of sensitive values related to a specific individual [35].…”
Section: L-diversity Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…However, this technique is vulnerable to a similarity attack [2,31,32]. A similarity attack occurs when values within an equivalence class are the same or even when there is a semantic significance between distinct sensitive values in the same equivalence class [23,34]. erefore, an adversary can deduce the different possibilities of sensitive values related to a specific individual [35].…”
Section: L-diversity Techniquementioning
confidence: 99%
“…Security and Communication Networks values in the same equivalence class [23,34]. erefore, an adversary can deduce the different possibilities of sensitive values related to a specific individual [35].…”
Section: Similarity Attackmentioning
confidence: 99%