Conventional methods implement processes of de-identification by the use of hashing methods applied to strings of characters generated from private data elements in data records. These conventional ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback