Research Article

A Secure and Efficient ECC-Based Anonymous Authentication Protocol

Figure 2

Nikooghadam et al.’s scheme.