Research Article
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Table 2
Comparisons of functionalities.
| ā | RG1 | RG2 | RG3 | RG4 | RG5 | RG6 | RG7 | RG8 | PKI |
| [6] | No | Yes | No | No | No | Yes | No | No | Yes | [10] | Yes | Yes | No | No | No | No | Yes | No | Yes | [13] | Yes | Yes | No | Yes | No | Yes | Yes | Yes | Yes | Ours | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
|
|