Skip to main content
editorial
. 2018 Jul 5;17:25. doi: 10.1186/s12942-018-0144-x

Fig. 2.

Fig. 2

Using private key to encrypt document to be read by outside party with appropriate public key