Skip to main content
. 2017 Dec 8;17(12):2849. doi: 10.3390/s17122849

Figure 5.

Figure 5

In-depth overview of the security module developed in bIoTope (cf. Case 2 in Figure 4b).