Research Article

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

Figure 2

Login and verification phases of the proposed protocol.