Research Article

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

Table 4

Performance Analysis with Recent Schemes.

Sl. NoSchemesNo. of BitsNo. of Messages

1 Lee et al. [2] 1184 7
2 Dey et al. [11] 1280 4
3 Lin et al. [12] 1536 4
4 Roy et al. [14] 864 2
5 Binu et al. [29] 2304 7
6 Our Scheme 576 3