Skip to main content
. 2023 Dec 8;13:21918. doi: 10.1038/s41598-023-48661-w

Figure 16.

Figure 16

Flowchart of data encryption upload.