Skip to main content
. 2012 Feb 7;12(2):1625–1647. doi: 10.3390/s120201625

Figure 3.

Figure 3.

Flow of the Login and Authentication phases.