Skip to main content
. 2018 Mar 5;13(3):e0193366. doi: 10.1371/journal.pone.0193366

Fig 4. The login and authentication phase of the proposed scheme.

Fig 4