Research Article
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
| Security attributes/Schemes | An | Chou et al. | Chang et al. | Kumari et al. | Kaul & Awasthi’s | Proposed | | [9] | [10] | [12] | [13] | [14] | scheme |
| User anonymity | | | | | | | Privileged insider attack | | | | | | | Replay attack | | | | | | | Off-line password guessing attack | | | | | | | User impersonation attack | | | | | | | Mutual authentication | | | | | | | Session key Compromise | | | | | | | Password verification process | | | | | | | Convenient password change | | | | | | | No time synchronization | | | | | | |
|
|