Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 4

Strong authentication in SPLICE/AS protocol. (a) SPLICE/AS protocol. (b) Clark and Jacob’s attack against SPLICE/AS protocol. (c) Clark and Jacob’s improved protocol.
(a)
(b)
(c)