(1) Utilized one-way hash function (2) Based on Diffie–Hellman problem (3) Based on smart card
(1) Does not resist password-guessing attacks (2) Does not resist impersonation attacks (3) Does not resist internal attacks (4) Does not resist smart card theft attacks (5) Does not support user anonymity
(1) Utilized ECC (2) Three-factor security (3) Based on data encryption scheme
(1) Does not resist impersonation attacks (2) Does not resist internal attacks (3) Does not provide forward secrecy (4) Does not provide three-factor secrecy (5) Does not resist known session-specific temporary information attack