In this paper, we propose an obfuscation scheme for the information contained in a trajectory of locations. The scheme requires no trusted entity for the obfuscation. The scheme includes two obfuscation methods, amplification and amalgamation, which obfuscates time-location information into a cylinder. © 2012 Springer-Verlag.
CITATION STYLE
Kiyomoto, S., Fukushima, K., & Miyake, Y. (2012). Obfuscation method for location trajectory. In Communications in Computer and Information Science (Vol. 339 CCIS, pp. 7–13). https://doi.org/10.1007/978-3-642-35264-5_2
Mendeley helps you to discover research relevant for your work.