Skip to main content
. 2018 Oct 20;18(10):3561. doi: 10.3390/s18103561

Figure 3.

Figure 3

Architecture for the secure controller functions delegation.