Skip to main content
. 2017 Mar 21;17(3):644. doi: 10.3390/s17030644

Figure 2.

Figure 2

Authentication mechanism using the biohashing approach.