K-anonymity on sensitive transaction items | IEEE Conference Publication | IEEE Xplore