Research Article
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Table 5
Comparison of computational overhead between our scheme and other schemes during all phases.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note: : the time to compute a one-way hash function; : the time to compute a modular exponentiation; : the time to compute a point multiplication on the elliptic curve group; : the time to compute a point addition on the elliptic curve group. |