Research Article
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers
Table 8
Notations in computation comparison table.
| | computation overhead in the login phase |
| | execution overhead in the login phase |
| | computation overhead in the authentication phase |
| | execution overhead in the authentication phase |
| | total execution overhead |
|
|