Skip to main content
. 2015 Jan 27;31(11):1701–1707. doi: 10.1093/bioinformatics/btv018

Fig. 2.

Fig. 2.

Presence proofs (length-2 and longer) and their generation. The attack also infers the frequency of each proof. When the frequency cannot be uniquely determined, the attack derives an upper bound and a lower bound for the frequency (as shown for the rightmost proof of length 3). A proof of length l is generated by combining two proofs of length l-1 that differ in exactly one genotype