Research Article
Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
Table 3
Comparison of computation costs.
| ||||||||||||||||||||||||||||||
P1: registration phase; P2: login phase; P3: authentication phase; P4: total computation cost; H: hash computation and its time cost; X: xor operation and its time cost. |