Login / Signup

Preserving source location privacy against the global attacker hiding in FOG.

Qian ZhouXiaolin Qin
Published in: ICNSC (2018)
Keyphrases
  • location privacy
  • location based services
  • mobile devices
  • cost effective
  • personal information
  • location information
  • privacy protection
  • mobile environments