Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 20

An instance of dataset in analysis of key authentication. (a) Otway-Rees’s protocol without key authentication denoted by category 1. (b) Abadi and Needham’s protocol with key authentication denoted by category 0.
(a)
(b)