Skip to main content
. 2011 Apr 12;18(3):212–217. doi: 10.1136/amiajnl-2011-000100

Figure 1.

Figure 1

Set-up phase of the secure computation protocol assuming only two practices are submitting data.