Research Article

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Figure 4

Comparison of the proposed and related scheme computation overhead.