k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous Query Processing
Vol. 14, No. 6, pp. 379-385, Jun. 2025
https://doi.org/10.3745/TKIPS.2025.14.6.379
-
Location-based service information protection continuous query processing k-trajectories(k-T) Guaranteed
k-trajectories(k-TG)
Abstract
Statistics
|
|
Cite this article
[IEEE Style]
S. D. Hee, "k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous
Query Processing," The Transactions of the Korea Information Processing Society, vol. 14, no. 6, pp. 379-385, 2025. DOI: https://doi.org/10.3745/TKIPS.2025.14.6.379.
[ACM Style]
Song Doo Hee. 2025. k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous
Query Processing. The Transactions of the Korea Information Processing Society, 14, 6, (2025), 379-385. DOI: https://doi.org/10.3745/TKIPS.2025.14.6.379.

Korean