Research Article

A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

Table 4

Comparison of communication overhead between our scheme and other related schemes during the login and authentication phases.

Scheme Total number of messages required Total number of bits required

Lee and Liu [13]
Das and Bruhadeshwar [14]
Sonwanshi et al. [3]
Jiang et al. [15]
Ours