Research Article
A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
Table 13
Computation time of different operations.
| Operations | Time | Experiment times |
| : one way hash function | 0.0394 ms | 1000000 | TE/D: symmetric encryption/decryption | 0.5728 ms | 100000 | : scalar multiplication in ECC-160 | 3.66 ms | 2733 |
|
|