Skip to main content
. 2016 Jun 15;16(6):879. doi: 10.3390/s16060879

Figure 7.

Figure 7

ECIES with AES based message encryption process.