Fig. 8From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe reputation of malicious cooperate nodesBack to article page