Research Article

Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment

Figure 16

Login and authentication phase in Wang et al.’s scheme [15].