Research Article

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing

Table 3

Comparing Resistance of Attacks.

Sl. NoScheme[7][1][2][8][9][10][11][12][13][15]Ours

1Formal Security ProofNoNoYesNoNoNoYesYesYesNoYes
2Forward SecrecyYesYesYesNoYesYesYesYesYesYesYes
3Login Phase EfficiencyYesNoYesNoYesYesYesYesYesYesYes
4Resistant to DoS AttackYesNoYesNoYesYesYesYesYesYesYes
5Resistant to Password Guessing AttackNoNoYesYesNoNoNoYesYesYesYes
6Resistant to Phishing AttackNoNoNoNoNoNoNoNoNoYesYes
7Resistant to Privileged Insider AttackYesNoNoYesYesNoYesYesYesYesYes
8Resistant to Server Impersonation AttackNoYesNoYesYesNoYesYesYesYesYes
9Resistant to Stolen Mobile Device AttackNoNoNoNoNoNoNoYesYesYesYes
10Resistant to Strong Reply AttackYesNoYesYesYesYesYesYesYesYesYes
11Resistant to Strong User AnonymityYesNoYesYesYesYesYesYesYesYesYes
12Resistant to User Impersonation AttackYesYesNoYesYesYesYesYesYesYesYes
13Secure Mutual AuthenticationYesYesYesYesYesYesYesYesYesYesYes
14Verification using Scyther or Other ToolsNoNoNoNoNoNoYesNoNoNoYes