Skip to main content
. 2019 Jan 24;19(3):487. doi: 10.3390/s19030487

Figure 1.

Figure 1

The structure of IP authentication system.