Skip to main content
. 2010 Oct 22;10(10):9529–9540. doi: 10.3390/s101009529

Figure 4.

Figure 4.

An illustration of the FSPC algorithm for secure data collection.