Fig. 5From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architectureExecution process of \(U_i\), \(S_j\), TCSBack to article page