As a result, we simply look at the phases of login/ authentication and the key establishment in this segment. All of the comparisons are described in detail below. 6.1. Computation Cost Analysis The notations used for comparison estimations are listed in Table 2. We signify certain notations ...