Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 8

UKS attack in Helsinki protocol. (a) Helsinki’s protocol. (b) UKS attack against Helsinki protocol. (c) Mitchell and Yeun’s improved protocol resistant against UKS.
(a)
(b)
(c)