Fig. 6From: Pseudonymization risk analysis in distributed systemsScreenshot of Violation ScoresBack to article page