Obfuscation Method for Location Trajectory
2012
In this paper, we propose an obfuscation scheme for the information contained in a trajectory of locations. The scheme requires no trusted entity for the obfuscation. The scheme includes two obfuscation methods, amplification and amalgamation, which obfuscates time-location information into a cylinder.
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
8
References
0
Citations
NaN
KQI