Research Article

An Improved Authentication Scheme for Digital Rights Management System

Table 4

Security features.

Schemes attributesOur[13][10]

PMA
PUA
PUS
RRA
RSD
RIA
RMA
PPF
ROP
RPI

Note: PMA: provides mutual authentication; PUA: provides user anonymity/untrability; PSU: provides user scalability; RRA: resists replay attack; RSD: resists stolen mobile device; RIA: resists impersonation attack; RMA: resists man in middle attack; PPF: provides perfect forward secrecy; ROP: resists offline password guessing; RPI: resists privileged insider attack; ✓: provides; ✗: not provides.