Return to Article Details k-anonymity in Resource Allocation for Vehicle-to-Everything (V2X) Systems Download Download PDF