Protocol | Security relies on | Method of Authentication | Design Principle |
W. Hsiang An et al.’s Protocol | Hash Function | Hybrid Key | ECC |
C. Popescu’s Protocol | ECDLP | Public/Private Key pairs | Diffie-Hellman |
L. Harn et al.’s Protocol | IFP | Public/Private Key pairs | Diffie-Hellman |
Tseng’s et al.’s Protocol | DLP | Public/Private Key pairs | Diffie-Hellman |
Y. Eun-Jun et al.’s Protocol | ECDLP | Password Based | ECC |
M. Nabil et al.’s Protocol | ECDLP | Hybrid Key | ECC |