Research Article
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
Table 6
The similarity between protocols.
| | IDH | MADH | IDHS | MADHS |
| IDH | 1 | 5.67 × 10−3 | 1.529 × 10−2 | 5.59 × 10−3 | MADH | 5.67 × 10−3 | 1 | 7.40 × 10−3 | 5.33 × 10−3 | IDHS | 1.529 × 10−2 | 7.40 × 10−3 | 1 | 7.71 × 10−3 | MADHS | 5.59 × 10−3 | 5.33 × 10−3 | 7.71 × 10−3 | 1 |
|
|