Fig. 3From: Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh networkInitial authentication protocolBack to article page