Skip to main content
. 2016 Aug 16;16(8):1299. doi: 10.3390/s16081299

Figure F2.

Figure F2

Login and verification phase for the Yeh et al.’s scheme [18].