Skip to main content
. 2017 Dec 15;17(12):2919. doi: 10.3390/s17122919

Figure 3.

Figure 3

Authentication phase of He et al.’s proposed scheme.