Research Article
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
Table 3
Comparisons of computation efficiency with related works.
| ||||||||||||||||||||||||||||||||||||||||||
Note. = the running time of one hash operation. = the running time of one XOR operation. = the running time of one point multiplication over elliptic curves group. = the running time of one point addition over elliptic curves group. = the running time of one modular exponentiation. |