Skip to main content
. 2018 Mar 5;13(3):e0193366. doi: 10.1371/journal.pone.0193366

Fig 2. The login and authentication phase of Chaudhry et al.’scheme.

Fig 2