Skip to main content
. 2016 Oct 7;16(10):1653. doi: 10.3390/s16101653

Table 2.

Security comparison.

Scheme SF1 SF2 SF3 SF4 SF5 SF6 SF7 SF8 SF9
Jiang et al. Yes Yes No Yes No Yes Yes Yes Yes
Wen et al. Yes Yes No Yes No Yes No No No
Shin et al. Yes Yes No Yes No Yes Yes Yes No
Gope and Hwang Yes Yes Yes Yes No Yes Yes Yes Yes
Farash et al. Yes No No Yes No Yes Yes Yes Yes
Ours Yes Yes Yes Yes Yes Yes Yes Yes No