Skip to main content
. 2020 Nov 11;8:205071–205087. doi: 10.1109/ACCESS.2020.3037474

FIGURE 4.

FIGURE 4.

Sequence of secure user interaction and system output.