Research Article

A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

Figure 1

Login and authentication phase of Zhou et al.’s scheme.