Research Article
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Table 2
Comparison on performance.
| Scheme | Client | Server |
| Lee et al. [20] | | | Xie et al.’s [26] | | | Farash and Attari’s [30] | | | Li et al.’s [31] | | | Lee et al.’s [25] | | | Niu and Wang’s [32] | | | Ours | | |
|
|