Skip to main content
. 2022 Dec 26;23(1):240. doi: 10.3390/s23010240

Table 3.

Storage overhead for analyzed authentication schemes.

Authentication Schemes Patient’s Side (Bits) Doctor’s Side (Bits)
Kumar et al. [44] 2176 2176
Jegadeesan et al. [50] 1792 1792
Debiao et al. [51] 1088 160
Jia et al. [52] 1184 1024
Proposed work 480 480