Research Article
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
Table 5
Computation Cost Analysis with Recent Schemes.
| Sl. No | Scheme | Cost of Computation |
| 1 | Lee et al. [2] | 4+3 | 2 | Dey et al. [11] | 5+4 | 3 | Lin et al. [12] | 10+2 | 4 | Roy et al. [14] | 9+1 | 5 | Binu et al. [29] | 9+3 | 6 | Our Scheme | 2+2 |
|
|