Figure 2From: Privacy-preserving distributed clustering One iteration of the protocol. Back to article page