Fig. 10From: Energy-efficient privacy-preserving data aggregation protocols based on slicingHidden probability with malicious ANsBack to article page