An efficient location privacy protection scheme based on the Chinese remainder theorem

J Wang, Y Han, X Yang - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and
mobile network environments. In fact, existing k-anonymity schemes only protect location in …

An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem

J Wang, Y Han, X Yang - Tsinghua Science and Technology, 2016 - sciopen.com
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and
mobile network environments. In fact, existing k-anonymity schemes only protect location in …