Return to Article Details Effective Privacy Preserving in Networks Using Merkle Hash Trees Download Download PDF