Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Method of trajectory privacy protection based on restraining trajectory in LBS
Zemao Zhao; Jiabo Wang; Chuanlin Sun; Youwei Yuan; Bin Li
International Journal of Information and Communication Technology (IJICT), 2018 Vol.13 No.3, pp.329 - 339
7 + 20 =

Thank you for your feedback.