Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Table 3

Similarity between protocols.

INSMANSINSLMANSL

INS12.27 × 10−39.71 × 10−32.41 × 10−3
MANS2.27 × 10−312.27 × 10−36.54 × 10−3
INSL9.71 × 10−32.27 × 10−312.43 × 10−3
MANSL2.41 × 10−36.54 × 10−32.43 × 10−31