Fig. 8
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Improved login and authentication phase-protocol (b).
From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Improved login and authentication phase-protocol (b).