Research Article
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
Figure 8
UKS attack in Helsinki protocol. (a) Helsinki’s protocol. (b) UKS attack against Helsinki protocol. (c) Mitchell and Yeun’s improved protocol resistant against UKS.
(a) |
(b) |
(c) |