Methods for privacy protection using k-anonymity | IEEE Conference Publication | IEEE Xplore