Login / Signup
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT.
Kexin Zhou
Jian Wang
Published in:
APNOMS (2019)
Keyphrases
</>
protection scheme
privacy preserving
privacy protection
information loss
original data
location information