Fig. 20From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksHandover cost when v and H varyBack to article page