Skip to main content
. 2025 Dec 28;16:3660. doi: 10.1038/s41598-025-33685-1

Table 4.

Security functionalities comparisons of all related authentication schemes.

Schemes Year Criteria
IInline graphic IInline graphic IInline graphic IInline graphic IInline graphic SInline graphic SInline graphic SInline graphic SInline graphic SInline graphic
Huang et al.9 2024 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
He et al.46 2023 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Fan et al.10 2023 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Parameswarath et al.15 2022 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Srinivas et al.47 2020 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
DA34FL Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic