Research Article

A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

Figure 3

The authentication process of our CL-BASA scheme.