Skip to main content
. 2017 Jan 16;41(3):37. doi: 10.1007/s10916-016-0657-4

Fig. 3.

Fig. 3

Player, 80-bit security