Skip to main content
. 2017 Jul 26;10(Suppl 2):43. doi: 10.1186/s12920-017-0278-x

Fig. 3.

Fig. 3

Power (LRT) of re-identification attacks of individuals on beacons constructed with 1000 individuals on our experimental setting without any privacy preserving mechanism