“…In addition, Wang et al's scheme is not easily repairable and is unable to provide perfect forward secrecy of the generated session key. Other instances of vulnerabilities in published smartcard-based password authentication schemes include off-line password guessing attack [6][7][8]22], impersonation attack [9][10][11], forgery attack [4,[12][13][14], DoS attack [4,7,18,23], parallel session attack [4,9,10,18], replay attack [23], stolen/lost smartcard attack [9,22,24], observing power consumption [25] and reverse engineering techniques [26,27].…”