Research Article
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
Table 3
Comparing Resistance of Attacks.
| Sl. No | Scheme | [7] | [1] | [2] | [8] | [9] | [10] | [11] | [12] | [13] | [15] | Ours |
| 1 | Formal Security Proof | No | No | Yes | No | No | No | Yes | Yes | Yes | No | Yes | 2 | Forward Secrecy | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 3 | Login Phase Efficiency | Yes | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 4 | Resistant to DoS Attack | Yes | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 5 | Resistant to Password Guessing Attack | No | No | Yes | Yes | No | No | No | Yes | Yes | Yes | Yes | 6 | Resistant to Phishing Attack | No | No | No | No | No | No | No | No | No | Yes | Yes | 7 | Resistant to Privileged Insider Attack | Yes | No | No | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | 8 | Resistant to Server Impersonation Attack | No | Yes | No | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | 9 | Resistant to Stolen Mobile Device Attack | No | No | No | No | No | No | No | Yes | Yes | Yes | Yes | 10 | Resistant to Strong Reply Attack | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 11 | Resistant to Strong User Anonymity | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 12 | Resistant to User Impersonation Attack | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 13 | Secure Mutual Authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | 14 | Verification using Scyther or Other Tools | No | No | No | No | No | No | Yes | No | No | No | Yes |
|
|