Research Article
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
Figure 4
Strong authentication in SPLICE/AS protocol. (a) SPLICE/AS protocol. (b) Clark and Jacob’s attack against SPLICE/AS protocol. (c) Clark and Jacob’s improved protocol.
(a) |
(b) |
(c) |