Research Article
An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
Table 2
Comparison of security attributes.
| Security attributes | Schemes | Li-Hwang’s [19] | Das’s [26] | An’s [27] | Ours |
| Resist online guessing attack | No | No | No | Yes | Resist offline guessing attack | No | No | No | Yes | Resist user impersonation attack | No | No | No | Yes | Resist server impersonation attack | No | No | No | Yes | Provides mutual authentication | No | No | No | Yes | Provides change facility | Yes | Yes | No | Yes | Provides user anonymity | No | No | No | Yes |
|
|