Advances, Systems and Applications
From: A trusted de-swinging k-anonymity scheme for location privacy protection
Notation | Definition |
---|---|
User | The real name of nodes |
id | The current pseudonym |
Numid | The number of pseudonym is used |
id_list | The list of historical pseudonyms |