Fig. 5From: Location privacy protection algorithm for mobile networksLooking for the relative maximum boundary tree for U2. a Looking for RMBT for U2. b RMBT in the model of simple mobile networkBack to article page