Advances, Systems and Applications
From: A trusted de-swinging k-anonymity scheme for location privacy protection
Property | Literature 28 | Literature 31 | Literature 27 | Our scheme |
---|---|---|---|---|
De-swinging | × | × | × | \(\checkmark \) |
Hitchhiking attack | × | × | \(\checkmark \ \) | \(\checkmark \) |
Location Information Entropy | × | × | × | \(\checkmark \) |
Optimal times of pseudonyms usege | \(\checkmark \) | × | × | \(\checkmark \) |