Research Article

Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks

Figure 4

Obtain the set of users.
(a) The first anonymity
(b) The second anonymity