Research Article
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
Figure 7
Key authentication in Otway-Rees protocol. (a) Otway-Rees protocol. (b) Boyd and Mao’s attack against Otway-Rees protocol. (c) Abadi and Needham’s improved protocol.
(a) |
(b) |
(c) |