Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Figure 4

Probability of attacker wins when .