Skip to main content
. 2020 Sep 10;20(18):5162. doi: 10.3390/s20185162

Figure 3.

Figure 3

Parameter analysis of encryption and decryption.