Research Article

A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation

Figure 1

Three different types of working principles.