Skip to main content
. 2001 Mar 17;3(1):e9. doi: 10.2196/jmir.3.1.e9

Figure 1.

Figure 1

Security credentials acquisition (Phase 1)