Research Article

Formal Analysis of the Security Protocol with Timestamp Using SPIN

Figure 12

Attack path of WMF protocol violating authentication.