Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.
Since encryption typically makes management tasks -- such as protocol analysis -- problematic, the ability to selectively secure transmissions is a bonus.