Fig. 3From: An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architectureImplementation of our protocol. Implementation of the registration, login, and authentication key agreement phases in the proposed protocolBack to article page