Research Article
An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
Table 5
Comparison of computational cost.
| | Schemes | Total comparison of computational cost | Time (ms) |
| | Our scheme | | 22.2551 ms | | Zhang et al.’s scheme [10] | | 25.0675 ms | | Irshad et al.’s scheme [11] | | 22.7839 ms | | Arshad et al.’s scheme [12] | | 11.1116 ms | | Lu et al.’s scheme [13] | | 16.0832 ms |
|
|