Research Article
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
Figure 20
An instance of dataset in analysis of key authentication. (a) Otway-Rees’s protocol without key authentication denoted by category 1. (b) Abadi and Needham’s protocol with key authentication denoted by category 0.
(a) |
(b) |