Research Article
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
Table 3
Results of security analysis.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
S1: Resist offline password guessing attack. S2: User anonymity. S3: Resist user impersonation attack. S4: Resist server impersonation attack. S5: Resist man-in-the-middle attack. S6: Resist desynchronization attack. S7: Forward secrecy. S8: Resist session key disclosure attack. S9: Efficient wrong password detection. S10: Resist insider attack. |