Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Figure 5

Probability of attacker wins when .