Fig. 4
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Login and authentication phase of PRLAP-IoD9.
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Login and authentication phase of PRLAP-IoD9.