Skip to main content
. 2018 Jun 5;18(6):1833. doi: 10.3390/s18061833

Figure 4.

Figure 4

Architecture of the proposed security solution.