Research Article

A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

Table 6

Functionality comparison between our scheme and other schemes.

Functionality [13] [14] [3] [15] Ours

No Yes No Yes Yes
Yes Yes Yes Yes Yes
No Yes Yes Yes Yes
Yes Yes Yes Yes Yes
Yes Yes No Yes Yes
Yes Yes No Yes Yes
Yes Yes No No Yes
Yes Yes No Yes Yes
Yes Yes No Yes Yes
Yes Yes No Yes Yes
No Yes No No Yes
No Yes No No Yes
No Yes No Yes Yes
No Yes Yes Yes Yes
No Yes Yes Yes Yes
No No No No No

Notes: : whether it protects against strong replay attacks or not; : whether it protects against man-in-the-middle attacks or not; : whether it protects against privileged insider attacks or not; : whether it protects against impersonation attacks or not; : whether it protects against stolen smart card attacks or not; : whether it protects against password guessing attacks or not; : whether it protects against denial-of-service attacks or not; : whether it provides mutual authentication or not; : whether it provides user anonymity property or not; : whether it establishes a secret session key between and after successful authentication or not; : whether it provides formal security proof or not; : whether it provides formal security verification or not; : whether it provides session key security or not; : whether it supports local password verification or not; : whether it provides password changing freely and correctly or not; : whether it requires any password verification table or not.