Research Article
The Research of Mobile Location Privacy Protection Access Control Method Based on Game Theory
Table 1
Game strategy matrix table.
| System | Visitors | Goodwill visit (G) | Malicious visits (E) |
| Allow access (P) | Ssin-ac, Fper-ac | -Sevil-ac, Fper-ac | Access denied (R) | -Ssin-ac, 0 | 0, -Fre-ac |
|
|