Research Article
Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre
Table 2
The notations and rules of BAN logic.
| Symbols | Description |
| , | A principal | | A statement | | is fresh | | gets | | is sent by | | believes | | and have a common secret | | is encrypted under | | is the public key of | | has jurisdiction over | | is merged with | Message meaning rule (rule 1) | or | Nonce-verification rule (rule 2) | | Jurisdiction rule (rule 3) | |
|
|