Research Article

Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment

Figure 20

Login and authentication phase in Kumari et al.’s scheme [16].