Research Article
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Table 6
Functionality comparison between our scheme and other schemes.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Notes: : whether it protects against strong replay attacks or not; : whether it protects against man-in-the-middle attacks or not; : whether it protects against privileged insider attacks or not; : whether it protects against impersonation attacks or not; : whether it protects against stolen smart card attacks or not; : whether it protects against password guessing attacks or not; : whether it protects against denial-of-service attacks or not; : whether it provides mutual authentication or not; : whether it provides user anonymity property or not; : whether it establishes a secret session key between and after successful authentication or not; : whether it provides formal security proof or not; : whether it provides formal security verification or not; : whether it provides session key security or not; : whether it supports local password verification or not; : whether it provides password changing freely and correctly or not; : whether it requires any password verification table or not. |