Fig. 11From: Location privacy protection algorithm for mobile networksThe average anonymous execution timeBack to article page