Research Article

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity

Table 2

Security comparison.

Security attributes/Schemes An Chou et al. Chang et al. Kumari et al. Kaul & Awasthi’s Proposed
[9] [10] [12] [13] [14] scheme

User anonymity
Privileged insider attack
Replay attack
Off-line password guessing attack
User impersonation attack
Mutual authentication
Session key Compromise
Password verification process
Convenient password change
No time synchronization