Research Article
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
Table 4
Performance Analysis with Recent Schemes.
| Sl. No | Schemes | No. of Bits | No. of Messages |
| 1 | Lee et al. [2] | 1184 | 7 | 2 | Dey et al. [11] | 1280 | 4 | 3 | Lin et al. [12] | 1536 | 4 | 4 | Roy et al. [14] | 864 | 2 | 5 | Binu et al. [29] | 2304 | 7 | 6 | Our Scheme | 576 | 3 |
|
|