“…Communication cost(bits) Islam [20] 1408 + 1408 = 2816 Jiang et al [14] 2304 + 1152 = 3456 Bym [21] 2176 + 1152 = 3328 Truong [22] 640 + 1152 = 1792 Wang-Wang [16] 1536 + 1152 = 2688 Ours 1536 + 1152 = 2688 Table III presents the computational cost of our scheme along with the related schemes [20], [14], [21], [22], [16] in login and authentication phases. The computational cost of the schemes [20], [14], [21], [22], [16] and our scheme are, respectively, 5t e + 6t h , 6t e + 8t h , 10t e + 2t s + 8t h , 4t c + 14t h , 6t e + 16t h and 6t e + 17t h . The scheme [21] has the higher computaional cost as compared to that of ours and does not offer the security features like verifier table, password friendly and timely typo detection.…”