Skip to main content

Advertisement

Fig. 3 | EURASIP Journal on Wireless Communications and Networking

Fig. 3

From: An anonymous entropy-based location privacy protection scheme in mobile social networks

Fig. 3

LBS request type It shows three real scenarios that users send requests to the LBS server. In each subgraph, the left part represents the user’s anonymous region and the right part shows the diversity of content requested by the user. The lines connecting the two parts represent the relationship between the user request and the corresponding LBS service. a Location privacy protected. b Content privacy inferred. c Location privacy inferred

Back to article page