[HTML][HTML] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - ISPRS International Journal of …, 2017 - mdpi.com
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

[PDF][PDF] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - Applications of Internet of Things - core.ac.uk
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

[PDF][PDF] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - pdfs.semanticscholar.org
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

[引用][C] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang… - … International Journal of …, 2017 - ui.adsabs.harvard.edu
Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain -
NASA/ADS Now on home page ads icon ads Enable full ADS view NASA/ADS Efficient Location …

Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain.

H Wang, H Huang, Y Qin, Y Wang… - … International Journal of …, 2017 - search.ebscohost.com
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

[PDF][PDF] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - Applications of Internet of Things - mdpi.com
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

[引用][C] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - 2017