Research Article

An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

Figure 5

Notations for computation cost of times.