Report - K-Isomorphism: Privacy Preserving Network Publication ...jcheng/papers/kIsomorphism_sigmod10.pdf · breach. This problem is similar to that of k-anonymity in relational databases,

Please pass captcha verification before submit form