Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 17

Another instance of dataset in analysis of strong authentication and UKS. (a) Helsinki protocol denoted by category 1. (b) Mitchell et al.’s protocol denoted by category 0.
(a)
(b)