Skip to main content
. 2018 Sep 6;13(9):e0202752. doi: 10.1371/journal.pone.0202752

Fig 2. The master-key is decrypted using the passphrase and stored in volatile memory.

Fig 2