Research Article
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
Table 1
Functionality comparison of the improved protocol with others.
| Property | [23] | [24] | [25] | [26] | [27] | [28] | The proposed |
| Mutual authentication | | | | | | | | User anonymity | | | | | | | | Impersonation attack | | | | | | | | Insider attack | | | | | | | | DoS attack | | | | | | | | Replay attack | | | | | | | | Off-line password guessing attack | | | | | | | | Stolen verifier attack | | | | | | | | Session key attack | | | | | | | | Provable security | | | | | | | |
|
|