Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Figure 5

Running time.