Skip to main content
. 2022 Feb 5;81(6):8719–8743. doi: 10.1007/s11042-022-12164-z

Fig. 1.

Fig. 1

The difference between centralized encryption (left image) and decentralized encryption (right image) [27]