Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Figure 3

Replay attack scenario 2.