Journals
Publish with us
Publishing partnerships
About us
Blog
Wireless Communications and Mobile Computing
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Wireless Communications and Mobile Computing
/
2020
/
Article
/
Fig 3
/
Research Article
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices
Figure 3
The design of our proposal.
is the secret information and
is the moment that the hash chain is consumed.