Research Article
Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
Table 2
Comparison of attack resistance.
| Attack resistance | D. Yang and B. Yang scheme [10] | Yoon and Yoo scheme [11] | Chuang and Chen scheme [13] | Our scheme |
| (A1) Replay attack | ◯ | | ◯ | ◯ | (A2) Modification attack | ◯ | ◯ | ◯ | ◯ | (A3) Stolen-verifier attack | ◯ | ◯ | ◯ | ◯ | (A4) Off-line guessing attack | ◯ | | ◯ | ◯ | (A5) Forgery attack | ◯ | | ◯ | ◯ | (A6) Insider attack | | | ◯ | ◯ | (A7) Masquerade attack | | | | ◯ | (A8) Smart card attack | ◯ | | | ◯ | (A9) User impersonation attack | ◯ | ◯ | | ◯ | (A10) DoS attack | | | | ◯ |
|
|