Skip to main content
. 2015 Feb 14;39(3):32. doi: 10.1007/s10916-015-0221-7

Table 3.

Functionality comparison

Ours Arshad et al. [27] Tan et al. [26] Awasthi et al. [24] Wen et al. [13]
User anonymity Yes Yes Yes No Yes
Mutual authentication Yes Yes Yes Yes Yes
The session key perfect forward secrecy Yes Yes - - Yes
Insider attack Yes Yes Yes Yes Yes
Impersonation attack Yes No Yes - -
Off-line password guessing attack Yes No Yes Yes Yes
Replay attack Yes Yes No Yes Yes
Modification attack Yes Yes Yes - -