Fig. 2From: An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architectureImplementation of Kang et al.’s protocol. Implementation of the registration, login, and authentication key agreement phases in Kang et al.’s protocolBack to article page