Fig. 12From: Location privacy protection algorithm for mobile networksRDAk, RDAl with respect to different parameter K settingsBack to article page