Wireless Communications and Mobile Computing / 2019 / Article / Tab 2 / Research Article
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing Table 2 Comparison in computation cost.
ā [22 ] [26 ] [27 ] [28 ] [24 ] [29 ] [25 ] [30 ] Ours S1 7 +3 +10TH 4 +4T H 4 + +5T H 3 + +6T H 3 + +9T H 5 + +9T H 4+ 5T H 4 +3T H 3 + +7T H S2 1.22 s 0.524 s 0.625 s 0.496 s 0.499 s 0.669 s 0.525 s 0.653 s 0.497 s S3 5 +2 +6T H 5 +5T H 4 + +5T H 3 + +6T H 3 +6T H 3 + +7T H 4 +5T H 5 +4T H 3 + +6T H S4 6.056 ms 5.855 ms 5.685 ms 3.616 ms 3.516 ms 3.517 ms 4.685 ms 5.854 ms 3.616 ms
S1: computation cost in mobile client side; S2: executing time in mobile client side; S3: computation cost in cloud server side; S4: executing time in cloud server side.