Fig. 7
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Improved login and authentication phase-protocol (a).
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Improved login and authentication phase-protocol (a).