Research Article

Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

Table 2

Comparison of attack resistance.

Attack resistance D. Yang and B. Yang scheme [10] Yoon and Yoo scheme [11] Chuang and Chen scheme [13] Our scheme

(A1) Replay attack
(A2) Modification attack
(A3) Stolen-verifier attack
(A4) Off-line guessing attack
(A5) Forgery attack
(A6) Insider attack
(A7) Masquerade attack
(A8) Smart card attack
(A9) User impersonation attack
(A10) DoS attack