Skip to main content
. 2023 Dec 8;13:21918. doi: 10.1038/s41598-023-48661-w

Figure 8.

Figure 8

Data encryption process.