Security and Communication Networks / 2017 / Article / Tab 1

Research Article

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

Table 1

Functionality comparison of the improved protocol with others.

Property[23][24][25][26][27][28]The proposed

Mutual authentication
User anonymity
Impersonation attack
Insider attack
DoS attack
Replay attack
Off-line password guessing attack
Stolen verifier attack
Session key attack
Provable security

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.