Skip to main content
. 2016 Oct 7;16(10):1653. doi: 10.3390/s16101653

Figure 5.

Figure 5

Login and authentication phase in the proposed scheme.