Research Article
An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
Table 1
Comparison of security properties.
| | Wang et al.’s scheme [9] | Wen et al.’s scheme [14] | Proposed scheme |
| User anonymity | No | No | Yes | Insider attack | No | No | Yes | Impersonation attack | No | Yes | Yes | Replay attack | No | No | Yes | Perfect forward secrecy | No | No | Yes | Key agreement | No | Yes | Yes |
|
|
Yes: supported and No: not supported.
|