Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Figure 7
Data transfer renderings.
(a) Initial (on the end ) |
(b) Initial (on the end ) |
(c) Initial (on the end ) |
(d) Connected with (on the end ) |
(e) Verification data received from (on the end ) |
(f) Verification data received from (on the end ) |
(g) Verification data received from (on the end ) |
(h) Verification data received from (on the end ) |
(i) (Verification) data received from (on the end ) |
(j) (Verification) data received from (on the end ) |