Many logged-in users with the same login-id attack, Password Change Attack and Table 3. Computational cost of the proposed protocol with other related .