Research Article

Safety Management Solution for Health Monitoring User Terminals Based on Trusted Computing

Figure 6

Attack model.