Research Article

A New Password- and Position-Based Authenticated Key Exchange

Figure 8

Verification algorithm of the verifiers in phase 3.