Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Table 1

Experiment parameters.

ParameterValueDescription

1/86400Average authentication rate
Length of hash chain
30 secInterval time
4Number of hash functions
The probability of an attacker eavesdrops on passwords