Fig. 14
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Graphical computational cost comparison of proposed schemes with similar recent schemes.
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Graphical computational cost comparison of proposed schemes with similar recent schemes.