Research Article

D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model

Figure 6

Running time vs. poker and synthetic datasets.
(a)
(b)
(c)