Research Article

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

Figure 7

Proposed Stage I authentication protocol autoverification using Scyther.