Skip to main content
. 2022 Nov 7;82(11):16279–16300. doi: 10.1007/s11042-022-14023-3

Table 2.

Comparison of data security at each stage

Gan et al. [12] This paper
Data Collecting
Data Tracing
Data Storage ×
Data Sharing ×