Return to Article Details Achieving Privacy Preservation Constraints based on K-Anonymity in conjunction with Adjacency Matrix and Weighted Graphs Download Download PDF