Fig. 4From: Efficient authenticated key exchange protocols for wireless body area networksThe computational time of different schemesBack to article page