Fig. 1
From: Implementation of a novel secured authentication protocol for cyber security applications

Communication costs Comparisons.
From: Implementation of a novel secured authentication protocol for cyber security applications

Communication costs Comparisons.