Skip to main content
. 2014 Nov 6;14(11):21023–21044. doi: 10.3390/s141121023

Figure 2.

Figure 2.

The authentication and key exchange protocol.