Research Article
An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network
Figure 8
Simulation results of the Scyther tool. (a) Message reachability analysis report of our protocol. (b) SK confidentiality analysis report of our protocol.
(a) |
(b) |