Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random- ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in order to obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs
As the booming of social networks, network analysis has benefited greatly from released network data...
Complex networks gathered from our online interactions provide a rich source of information that can...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of...
Graph anonymisation aims at reducing the ability of an attacker to identify the nodes of a graph by ...
Social network providers anonymize graphs storing users' relationships to protect users from being r...
Abstract. Due to the large interest in analyzing social network structures for scientific and market...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
In this article we provide a formal framework for reidentification in general. We define n-confusion...
none3siThe popularity of online social media platforms provides an unprecedented opportunity to stud...
The problem of anonymization in large networks and the utility of released data are considered in th...
International audienceA graph is said to be k-anonymous for an integer k, if for every vertex in the...
The growing popularity of social networks and the increasing need for publishing related data mean t...
As the booming of social networks, network analysis has benefited greatly from released network data...
Complex networks gathered from our online interactions provide a rich source of information that can...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of...
Graph anonymisation aims at reducing the ability of an attacker to identify the nodes of a graph by ...
Social network providers anonymize graphs storing users' relationships to protect users from being r...
Abstract. Due to the large interest in analyzing social network structures for scientific and market...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
In this article we provide a formal framework for reidentification in general. We define n-confusion...
none3siThe popularity of online social media platforms provides an unprecedented opportunity to stud...
The problem of anonymization in large networks and the utility of released data are considered in th...
International audienceA graph is said to be k-anonymous for an integer k, if for every vertex in the...
The growing popularity of social networks and the increasing need for publishing related data mean t...
As the booming of social networks, network analysis has benefited greatly from released network data...
Complex networks gathered from our online interactions provide a rich source of information that can...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...