Research Article
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
Table 1
Notation and Description.
| Notation | Description |
| ā | Concatenation | ā | XOR Operation | h(U) | Hash Value of User ID | h(PW) | Hash Value of Password | U | Mobile Cloud User | S | Cloud Service Provider | AS | Authentication Server | Uid | Client URI with Mobile No | sk(U) | Private Key of User | pk(U) | Public Key of User | sk(S) | Private Key of CSP | pk(S) | Public Key of CSP | Ns | Fresh Authentication ID | R | Random Value Gen by User | Na, Nu1, Nu2, Nu3 | Fresh Nonce | h() | Hash Function |
|
|