Research Article

Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing

Table 5

Security comparison.

Shen in [16]Li in [25]MTSAS

Message confidentiality
Message integrity
Resist key guessing attack
Resist replay attack
Forward Security
User anonymity
Resist biometrics template attack
Resist data leakage of the server
Two servers
Divide the security level