Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 10

Some assumptions.

NumberAssumptions

A1
A2
A3
A4
A5
A6
A7
A8
A9
A10
A11
A12
A13
A14