Keyphrases
Hybrid Method
100%
Database Protection
100%
Private Information Retrieval
100%
Location-based Queries
100%
Cloaking Region
83%
Rectangular Region
16%
Two-step Approach
16%
Protection Methods
16%
Location Privacy
16%
Global Positioning
16%
Large-sized
16%
Retrieval-based
16%
User Protection
16%
Region Information
16%
User Privacy
16%
Goods Trade
16%
Location-based Services
16%
Location Information
16%
Location Cloaking
16%
Cryptographic Protocols
16%
Dynamic Points
16%
Retrieval Approach
16%
User Location
16%
Computation Overhead
16%
Computer Science
Hybrid Technique
100%
Database Protection
100%
Information Retrieval
100%
Cloaking Region
83%
Points of Interest
83%
Communication Overhead
33%
Location-Based Service
16%
User Privacy
16%
Location Privacy
16%
Location Data
16%
Protection Technique
16%
Cryptographic Protocol
16%
Mobile Device
16%
Experimental Result
16%
Processing Overhead
16%
Hybrid Approach
16%