Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma,…