Skip to main content
. 2014 Aug 13;14(8):14786–14805. doi: 10.3390/s140814786

Figure 7.

Figure 7.

Authentication phase: login and verification steps flow.