Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Figure 2

Replay attack scenario 1.