Research Article
An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
Table 5
Comparison of computational cost.
| Schemes | Total comparison of computational cost | Time (ms) |
| Our scheme | | 22.2551 ms | Zhang et al.’s scheme [10] | | 25.0675 ms | Irshad et al.’s scheme [11] | | 22.7839 ms | Arshad et al.’s scheme [12] | | 11.1116 ms | Lu et al.’s scheme [13] | | 16.0832 ms |
|
|