Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Notations in Lwamo et al.’s scheme.

More »

Table 1 Expand

Table 2.

Notations in Zhou et al.’s scheme.

More »

Table 2 Expand

Table 3.

Notation used in proposed scheme.

More »

Table 3 Expand

Fig 1.

User registration phase in the proposed scheme.

More »

Fig 1 Expand

Fig 2.

Server registration phase in the proposed scheme.

More »

Fig 2 Expand

Fig 3.

Authentication and session key exchange phase of the proposed scheme.

More »

Fig 3 Expand

Fig 4.

Role specification in HLPSL for the user U.

More »

Fig 4 Expand

Fig 5.

Role specification in HLPSL for the server S.

More »

Fig 5 Expand

Fig 6.

Role specification in HLPSL for the registration center R.

More »

Fig 6 Expand

Fig 7.

Role specification in HLPSL for the session.

More »

Fig 7 Expand

Fig 8.

Role specification in HLPSL for the environment.

More »

Fig 8 Expand

Fig 9.

Role specification in HLPSL for the goal.

More »

Fig 9 Expand

Fig 10.

The result of the analysis using OFMC back-end.

More »

Fig 10 Expand

Fig 11.

The result of the analysis using CL-AtSe back-end.

More »

Fig 11 Expand

Table 4.

Comparison of the computational cost between the proposed scheme and other schemes in the authentication and session key exchange phase.

More »

Table 4 Expand

Table 5.

Communication overhead of our proposed scheme.

More »

Table 5 Expand

Table 6.

Comparison of the computational cost between the proposed scheme and other schemes.

More »

Table 6 Expand

Table 7.

Comparative evaluation of the security function between the proposed scheme and other schemes.

More »

Table 7 Expand