Fig. 4From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architectureDefinitions, queries, and eventsBack to article page