Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Figure 3

The design of our proposal. is the secret information and is the moment that the hash chain is consumed.