“…However, the diffidence of the protocols suggested in (Li, C. C.Lee, Liu, & C. W. Lee, 2011) and (Hsiang & Shih, 2009) was verified by researchers (X. Li, Qiu, Zheng, Chen, & J. Li, 2010;Li, Xiong, Ma, & Wang, 2012;Juang, Chen, & Liaw, 2008) correspondingly, which exposed that confrontation to impersonation, replay, stolen smart card and leak of verifier attacks could not be delivered.…”