Search results
Jump to navigation
Jump to search
- {{Short description|Property of certain anonymized data}} ...st2=Latanya |last1=Samarati |first1=Pierangela |date=1998 |website=Harvard Data Privacy Lab |access-date=April 12, 2017}}</ref> although the concept dates ...16 KB (2,201 words) - 19:24, 22 February 2025
- ...the re-identifiability of high-dimensional [[Data anonymization|anonymous data]]. First introduced in 2013,<ref name="uinc">{{cite journal ...the number of points ''p'' needed to uniquely identify an individual in a data set. The fewer points needed, the more unique the traces are and the easier ...6 KB (797 words) - 12:57, 9 February 2025
- '''MAC address anonymization''' performs a [[one-way function]] on a [[MAC address]] so that the result An example of MAC address anonymization would be to use a simple hash algorithm. Given an address of <code>11:22:33 ...8 KB (1,139 words) - 22:44, 21 November 2024
- ...ed by health authorities, it augments more traditional [[contact tracing]] techniques by automatically logging close approaches among notification system users u ...ULL, \text{'CT-DTK'}||D_i, 16)</math>'', where <math>HKDF(\text{Key, Salt, Data, OutputLength})</math> is a [[HKDF]] function using SHA-256, and <math>D_i< ...73 KB (9,512 words) - 21:06, 12 September 2024