Skip to main content
. 2011 Apr 12;18(3):212–217. doi: 10.1136/amiajnl-2011-000100

Figure 2.

Figure 2

Actual operation of the protocol to securely compute counts.