Skip to main content
. 2022 Dec 20;23(1):14. doi: 10.3390/s23010014

Figure 5.

Figure 5

Key management and end-to-end encryption: Throughout their lifecycle, PHRs rely on different layers and demand proper encryption/decryption processes to fulfill requests from health institutions and private individuals.