Research Article
An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network
Figure 2
Attack path under the Dolev-Yao model using Scyther. (a) Path of authenticating . (b) Path of authenticating .
(a) |
(b) |