Research Article
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
Figure 3
Strong authentication in security protocols. (a) A security protocol without strong authentication, (b) an attack against strong authentication and (c) improved protocol with strong authentication.
(a) |
(b) |
(c) |