Skip to main content
. 2017 Jan 16;41(3):37. doi: 10.1007/s10916-016-0657-4

Fig. 2.

Fig. 2

Outsourcing provider, 80-bit security