Skip to main content
. 2016 Oct 7;16(10):1653. doi: 10.3390/s16101653

Figure 3.

Figure 3

Password change phase in Farash et al.’s scheme.