Research Article
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
| Schemes | Communication structure |
| Ours | | He et al. [67] | | Challa et al. [68] | | Ma et al. [69] | | Taher et al. [70] | | Chandrakar and Om [71] | | Lu et al. [72] | | Mo and Chen [73] | |
|
|