Research Article

Limiting Privacy Breaches in Average-Distance Query

Figure 1

The process of the attack.