Using constraints to protect personal location information | IEEE Conference Publication | IEEE Xplore