Skip to main content
. 2015 Aug 11;10(8):e0131368. doi: 10.1371/journal.pone.0131368

Table 5. Security and functionality comparison of the proposed scheme with other existing schemes.

Attributes Wen [3] Zhu [34] Wu et al. [57] Cheng et al. [58] Lee [59] Proposed
F 1 No No No No No Yes
F 2 No No NA NA NA Yes
F 3 No Yes Yes No Yes Yes
F 4 No Yes No Yes No Yes
F 5 No No No No No Yes
F 6 No NA NA No NA Yes
F 7 No NA NA Yes NA Yes
F 8 No Yes NA No No Yes
F 9 Yes NA NA No No Yes
F 10 Yes No No Yes Yes Yes
F 11 Yes Yes Yes Yes Yes Yes
F 12 Yes Yes Yes Yes Yes Yes
F 13 Yes Yes NA No Yes Yes
F 14 Yes Yes Yes Yes Yes Yes

F 1: Login identity and password detection in the login phase; F 2: Login identity and password detection in the password change phase; F 3: Impersonation attack is avoided; F 4: Privileged-insider attack is avoided; F 5: Lost/stolen smart card revocation phase is present; F 6: Explicit session key confirmation property is present; F 7: No key control property is present; F 8: Password is changed without any help from the server; F 9: Ephemeral secrets leakage attack is avoided; F 10: User anonymity and unlinkability are present; F 11: Password guessing attack from lost smart card is avoided; F 12: Replay attack is avoided; F 13: Forward secrecy of the session key is present; F 14: modification/forgery attack is avoided.