Fig. 2From: A trusted de-swinging k-anonymity scheme for location privacy protectionSystem architectureBack to article page