Fig. 6From: An efficient reversible privacy-preserving data mining technology over data streamsAnalysis of execution time. a Data protection, b data recoveryBack to article page