Research Article

Formal Analysis of the Security Protocol with Timestamp Using SPIN

Table 3

Experimental results of WMF protocol.

Verification resultsReference [22]Reference [23]This paper

Attack path 1
Attack path 2