Fig. 19From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksThe key size during user movementsBack to article page