Figure 2From: The research for protecting location privacy based on V-W algorithmThe flow of an anonymous request. The users submit the location service request to third party anonymous servers through the IPsec encryption tunnel. With the operation of V-M algorithm in the anonymous servers, the servers submit the anonymous location service request to LBS.Back to article page