Table 11.
Security Features | Wu et al. [12] | Li et al. [15] | Masud et al. [6] | Ours |
---|---|---|---|---|
1. Resist Offline Password Guessing Attack | O | O | X | O |
2. Resist Privileged Insider Attack | O | O | X | O |
3. Resist User Impersonation Attack | X | O | O | O |
4. Resist Server Impersonation Attack | O | X | O | O |
5. Resist Replay Attack | X | X | X | O |
6. Resist Man-in-the-Middle Attack | O | O | O | O |
7. Resist Session Key Disclosure Attack | X | O | O | O |
8. Preserve Forward Secrecy and Backward Secrecy | O | O | O | O |
9. Provide Mutual Authentication | O | O | O | O |
10. Preserve Anonymity | X | X | X | O |