Skip to main content
. 2021 Nov 29;16(11):e0260014. doi: 10.1371/journal.pone.0260014

Fig 4. Encryption flowchart.

Fig 4