Login / Signup
Method of trajectory privacy protection based on restraining trajectory in LBS.
Zemao Zhao
Jiabo Wang
Chuanlin Sun
Youwei Yuan
Bin Li
Published in:
Int. J. Inf. Commun. Technol. (2018)
Keyphrases
</>
privacy protection
input data
information loss
database
management system