Research Article

An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

Table 1

Comparison of security properties.

Wang et al.’s scheme [9]Wen et al.’s scheme [14]Proposed scheme

User anonymityNoNoYes
Insider attackNoNoYes
Impersonation attackNoYesYes
Replay attackNoNoYes
Perfect forward secrecyNoNoYes
Key agreementNoYesYes

Yes: supported and No: not supported.