Research Article

Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing

Figure 3

Attacker model.