Examines the various privacy breaches that may arise due to the use of LBSs, and considers and compares the mechanisms and metrics that have been proposed to protect user privacy, focusing in particular on a comparison between probabilistic spatial obfuscation techniques.
Examines the various privacy breaches that may arise due to the use of LBSs, and considers and compares the mechanisms and metrics that have been prop...