Research Article
Password Authentication Based on Fractal Coding Scheme
Table 2
Security comparison of the proposed scheme against some password authentication scheme.
| | Our proposed method | Lamport [2] | Hwang and Li’s [4] | Lee et al.’s [8] |
| Guessing attack | Yes | No | No | Yes | Replay attack | Yes | No | No | Yes | Stolen-verifier attack | Yes | No | Yes | Yes | Denial of service attack | Yes | No | Yes | Yes | Man in the Middle attack | Yes | No | No | No |
|
|