Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Figure 2

The structure of T/Key’s hash chain. is a uniformly random secret key.