Fig. 1From: Location privacy protection algorithm for mobile networksA model of simple mobile networkBack to article page