Table 11.
Comparisons of the security features.
| Security Features | Wu et al. [12] | Li et al. [15] | Masud et al. [6] | Ours |
|---|---|---|---|---|
| 1. Resist Offline Password Guessing Attack | O | O | X | O |
| 2. Resist Privileged Insider Attack | O | O | X | O |
| 3. Resist User Impersonation Attack | X | O | O | O |
| 4. Resist Server Impersonation Attack | O | X | O | O |
| 5. Resist Replay Attack | X | X | X | O |
| 6. Resist Man-in-the-Middle Attack | O | O | O | O |
| 7. Resist Session Key Disclosure Attack | X | O | O | O |
| 8. Preserve Forward Secrecy and Backward Secrecy | O | O | O | O |
| 9. Provide Mutual Authentication | O | O | O | O |
| 10. Preserve Anonymity | X | X | X | O |