Skip to main content
editorial
. 2018 Jul 5;17:25. doi: 10.1186/s12942-018-0144-x

Fig. 1.

Fig. 1

Using shared public key to encrypt document from outside party