Skip to main content
. Author manuscript; available in PMC: 2017 Sep 14.
Published in final edited form as: IEEE Trans Dependable Secure Comput. 2015 Oct 1;14(5):463–477. doi: 10.1109/TDSC.2015.2484326

Fig. 5.

Fig. 5

The average magnitude of redundant noise for different rate of required noise shares γ (α = 0.1), and privacy budgets α (γ = 10/32).