Research Article

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

Table 5

Computation Cost Analysis with Recent Schemes.

Sl. No SchemeCost of Computation

1Lee et al. [2]4+3
2Dey et al. [11]5+4
3Lin et al. [12]10+2
4Roy et al. [14]9+1
5Binu et al. [29]9+3
6Our Scheme2+2