Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks | IEEE Conference Publication | IEEE Xplore