Research Article
Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme
Table 3
Functionality comparison between our scheme and Tseng et al.'s scheme.
| ā | Our scheme | Tseng et al.'s scheme [27] |
| Protect user anonymity | Yes | No | Resist impersonation attack | Yes | Yes | Resist insider attack | Yes | No | Resist stolen smart card attack | Yes | No | Resist server spoofing attack | Yes | Yes | Efficient for password verification | Yes | No | Mutual authentication | Yes | Yes | Session key agreement | Yes | Yes |
|
|