Research Article
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices
| Parameter | Value | Description |
| | 1/86400 | Average authentication rate | | | Length of hash chain | | 30 sec | Interval time | | 4 | Number of hash functions | | | The probability of an attacker eavesdrops on passwords |
|
|