Skip to main content
. 2016 Oct 7;16(10):1653. doi: 10.3390/s16101653

Figure 2.

Figure 2

Login and authentication phase in Farash et al.’s scheme.