Research Article

An Improved Authentication Scheme for Digital Rights Management System

Figure 3

Yu et al.’s login and authentication scheme.