Skip to main content
. 2022 Dec 26;23(1):240. doi: 10.3390/s23010240

Figure 4.

Figure 4

Communication overhead for analyzed authentication schemes (Liu at al. [49], Kumar at al. [44], Jegadeesan et al. [50], Debiao et al. [51] and Jia at al. [52]).