“…However, these are vulnerable to various attacks such as replay attack [5,11,20,21], privileged-insider attack [14,[23][24][25], impersonation attack [5,9], lost/stolen smartcard attack [23,24], known session-specific temporary information attack [5,11,12,14,25], and many logged-in users' attack [5,11,12,14,25]. In addition, some of these schemes are faces from the problem of users' anonymity [5,11,14,25], perfect forward security [5,9] and clock synchronization [9][10][11]25]. In 2011, Debiao et al [14] proposed an ID-based client authentication with key agreement scheme on ECC for mobile client-server environments.…”