Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Figure 9

The effect of the number of trajectories k on the running time.