Skip to main content
. 2021 Oct 2;22:712. doi: 10.1186/s12864-021-07996-2

Fig. 10.

Fig. 10

Workflow of the sharing method showing decryption of BDIFF and encryption of its subrange intended for a specific user