Research Article

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment

Figure 7

Data transfer renderings.
(a) Initial (on the end )
(b) Initial (on the end )
(c) Initial (on the end )
(d) Connected with (on the end )
(e) Verification data received from (on the end )
(f) Verification data received from (on the end )
(g) Verification data received from (on the end )
(h) Verification data received from (on the end )
(i) (Verification) data received from (on the end )
(j) (Verification) data received from (on the end )