Recently, Tsai et al., Liao et al. and Li et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, we found some security loopholes in each of their schemes, for example, both Tsai et al.\'s and Liao et al.\'s schemes suffers from server spoofing attack by an insider server. Li et al.s\' suffers from the lost smart card password-guessing attack. In addition, Liao et al.\'s scheme also has the off-line password-guessing attack. In this paper, we will first review then show the attacks on each of the schemes. Then, based on Li et al.\'s scheme, we proposed a novel one and examined its security in several security features. After security analysis, we concluded that our protocol outperformed Li et al.\'s scheme in the security feature of lost smart card password-guessing attack.
Keywords: multi-server, password authentication protocol