Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Table 6

The similarity between protocols.

IDHMADHIDHSMADHS

IDH15.67 × 10−31.529 × 10−25.59 × 10−3
MADH5.67 × 10−317.40 × 10−35.33 × 10−3
IDHS1.529 × 10−27.40 × 10−317.71 × 10−3
MADHS5.59 × 10−35.33 × 10−37.71 × 10−31