Research Article

A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers

Table 8

Notations in computation comparison table.

computation overhead in the login phase

execution overhead in the login phase

computation overhead in the authentication phase

execution overhead in the authentication phase

total execution overhead