Skip to main content
. 2022 Dec 26;23(1):240. doi: 10.3390/s23010240

Figure 2.

Figure 2

Computation overhead of analyzed authentication schemes at the patient’s side (Liu at al. [49], Kumar at al. [44], Jegadeesan et al. [50], Debiao et al. [51] and Jia at al. [52]).