Figure 4From: Privacy-preserving distributed clustering Run-time of the privacy-preserving algorithm with respect to different numbers of helper users. Back to article page