Fig. 2From: Location privacy protection algorithm for mobile networksLocation anonymity architectureBack to article page