Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2017
/
Article
/
Tab 5
/
Research Article
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
Table 5
Euclidean distance between protocols.
ā
IDH
MADH
IDHS
MADHS
IDH
0
176
64
167
MADH
176
0
135
187
IDHS
64
135
0
129
MADHS
167
187
129
0