Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"
Fig 3
The authentication procedure between the MAG and the LMA.
Click through the PLOS taxonomy to find articles in your field.
For more information about PLOS Subject Areas, click here.
The authentication procedure between the MAG and the LMA.