Research Article

Formal Analysis of the Security Protocol with Timestamp Using SPIN

Figure 1

Security protocol with timestamp verification scheme.