Skip to main content
. 2014 Apr 22;14(4):7096–7119. doi: 10.3390/s140407096

Figure 13.

Figure 13.

(a) Security Test 1; (b) Security Test 2.