Research Article

An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

Figure 3

Authentication phase.