Table 3.
Yeh et al. [5] (2011) | Liu–Chung [21] (2016) | The Proposed Scheme | |
---|---|---|---|
F1 | √ | ||
F2 | √ | √ | |
F3 | √ | √ | √ |
F4 | √ | √ | |
F5 | √ | ||
F6 | √ | √ | |
F7 | − | √ | |
F8 | − | √ | |
F9 | √ | √ | |
F10 | √ | √ |
F1: Provision of user anonymity; F2: provision of efficient login phase; F3: provision of mutual authentication; F4: provision of session key security; F5: prevention of password disclosure attack; F6: prevention of replay attack; F7: prevention of sensed data disclosure attack; F8: prevention of sensed data forgery attack; F9: prevention of stolen smart card attack; F10: prevention of off-line password guessing attack; √: yes; : no; −: not mentioned.