Skip to main content
editorial
. 2018 Jul 5;17:25. doi: 10.1186/s12942-018-0144-x

Fig. 3.

Fig. 3

Using asymmetric encryption in addition to hashing to digitally sign a document