Research Article
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments
Table 2
Computation cost comparison of our protocol with other protocols.
| Scheme | User | Server | Total |
| Pippal et al. [14] | | | | Yeh [16] | | | | Wei et al. [32] | | | | Li et al. [33] | | | | Proposed | | | |
|
|