Fig. 4From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe interaction process of anonymous domain constructionBack to article page