Login / Signup

A personalized trajectory privacy protection method.

Jiachun LiGuoqian Chen
Published in: Comput. Secur. (2021)
Keyphrases
  • privacy protection
  • data sets
  • information loss
  • digital libraries
  • data analysis
  • data warehouse
  • data access
  • normal form