Review Article

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Figure 2

Login phase.