Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Figure 10

Single-item generation algorithm compared with the algorithm of this paper.