Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Figure 2

User registration phase.