Fig. 11From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe computation time of constructing the anonymous cloakingBack to article page