Table 8 Communication cost comparison (in bits) of proposed schemes with similar recent schemes.
From: Two secure authentication protocols for mitigating vulnerabilities in IoD
From: Two secure authentication protocols for mitigating vulnerabilities in IoD