Security flaw of authentication scheme with anonymity for wireless communications

Recently, Wu et al. discussed some security flaws of enhanced authentication scheme with anonymity for wireless environments proposed by Lee et al. and showed how to overcome the problems regarding anonymity and backward secrecy. However, in the paper, we will show that Wu et al.'s improved scheme still did not provide user anonymity as they claimed.