Skip to main content
. 2019 Jul 1;10(33):7773–7778. doi: 10.1039/c9sc02633a

Fig. 3. Schematic illustration of lifetime-encoding for security applications using PYCl/CB[6], PCC/CB[6] and PBC/CB[6].

Fig. 3