Research Article
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Table 1
Comparisons of security features.
| ā | PGAR | VTAR | PCIAR | FSR | DoSAR | KTIAR |
| [6] | No | No | Yes | No | No | No | [10] | No | No | No | Yes | No | Yes | [13] | No | Yes | Yes | Yes | No | Yes | Ours | Yes | Yes | Yes | Yes | Yes | Yes |
|
|