Skip to main content
. 2017 Jun 23;17(7):1482. doi: 10.3390/s17071482

Table 3.

Functionality comparisons among the proposed scheme and other related schemes.

Yeh et al. [5] (2011) Liu–Chung [21] (2016) The Proposed Scheme
F1 χ χ
F2 χ
F3
F4 χ
F5 χ χ
F6 χ
F7 χ
F8 χ
F9 χ
F10 χ

F1: Provision of user anonymity; F2: provision of efficient login phase; F3: provision of mutual authentication; F4: provision of session key security; F5: prevention of password disclosure attack; F6: prevention of replay attack; F7: prevention of sensed data disclosure attack; F8: prevention of sensed data forgery attack; F9: prevention of stolen smart card attack; F10: prevention of off-line password guessing attack; √: yes; χ: no; −: not mentioned.