Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Figure 1

Lamport’s hash chain.