Login / Signup

Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT.

Kexin ZhouJian Wang
Published in: APNOMS (2019)
Keyphrases
  • protection scheme
  • privacy preserving
  • privacy protection
  • information loss
  • original data
  • location information