Research Article

Formal Analysis of the Security Protocol with Timestamp Using SPIN

Figure 11

Attack path of WMF protocol violating key freshness.