Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Figure 1

The start-point of the trajectory is seen by the attacker.