Fig. 4From: Pseudonymization risk analysis in distributed systemsPseudonymization risk analysis outputBack to article page