Skip to main content
. 2012 Jul 31;2012:519723. doi: 10.1155/2012/519723

Table 2.

Security comparison of the related scheme and the enhanced scheme.

Security features Li-Hwang's scheme [12] Das's scheme [13] Enhanced scheme
User impersonation attack Possible Possible Impossible
Sever masquerading attack Possible Possible Impossible
Password guessing attack Possible Possible Impossible
Insider attack Possible Possible Impossible
Mutual authentication Not provided Not provided Provided