Skip to main content
. 2017 Jan 3;12(1):e0169414. doi: 10.1371/journal.pone.0169414

Fig 2. Li et al.’s authentication scheme.

Fig 2