요약
ABSTRACT
1. INTRODUCTION
2. RELATED RESEARCHES
2.1 RE-IDENTIFICATION PROCESS BASED ON ISO 25237[1]
2.2 DIFFERENTIAL PRIVACY METHOD EMPLOYING A SECRET SHARING TECHNIQUE[2]
3. THE PROPOSED RE-IDENTIFICATION METHOD
3.1 ANALYSIS OF THE SUGGESTED METHOD
4. CONCLUSION AND FUTURE RESEARCH DIRECTION
REFERENCES