Fig. 6From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architectureVerification resultBack to article page