(3) Debiao et al. demonstrated that Khan et al. The proposed scheme includes four phase: registration, login, authentication and session key establishment, .