Skip to main content
. 2018 Mar 5;13(3):e0193366. doi: 10.1371/journal.pone.0193366

Fig 1. User authentication process in ubiquitous networks.

Fig 1