Skip to main content
. 2020 Nov 16;27(3):697–713. doi: 10.1007/s00779-020-01475-3

Fig. 2.

Fig. 2

Workflow graph of the suggested secure health monitoring model