| Protocol | Security relies on | Method of Authentication | Design Principle |
| W. Hsiang An et al.’s Protocol | Hash Function | Hybrid Key | ECC |
| C. Popescu’s Protocol | ECDLP | Public/Private Key pairs | Diffie-Hellman |
| L. Harn et al.’s Protocol | IFP | Public/Private Key pairs | Diffie-Hellman |
| Tseng’s et al.’s Protocol | DLP | Public/Private Key pairs | Diffie-Hellman |
| Y. Eun-Jun et al.’s Protocol | ECDLP | Password Based | ECC |
| M. Nabil et al.’s Protocol | ECDLP | Hybrid Key | ECC |