Fig. 1From: Controlling the signal: Practical privacy protection of genomic data sharing through Beacon servicesAn illustration of the ASBA attack and defense process of the iDASH challengeBack to article page