Research Article

A New Password- and Position-Based Authenticated Key Exchange

Figure 4

The participant’s algorithm for generating the authentication information in phase 2.