Research Article
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
Table 2
Performance comparison of the improved protocol with others.
| | [25] | [29] | [26] | [27] | [28] | [30] | The proposed |
| Registration | | | | | | | | Login | | | | | | | | Verification | | | | | | | | Total | | | | | | | | Time (ms) | 197.2 | 197.0 | 132.4 | 132.6 | 197.6 | 196.6 | 72.9 |
|
|