Skip to main content
. 2019 Jul 21;19(14):3208. doi: 10.3390/s19143208

Figure 12.

Figure 12

Possible authentications for IoT devices.