Functionality Consideration Clause Samples

Functionality Consideration. Now we move on the functionality consideration. Some comparisons with related works are presented. We exam- ine our protocol as follows. Then, HA can compute N = hj(pw) ⊕ D, and re- trieve IDMN from R. We can see that if the mobile user does not submit the correct IDMN and pass- word, HA cannot decrypt R correctly, and the re- trieved IDMN cannot equal the previous one from IM . Finally, both MN and FA can compute the agreed session key SK = Ed×A(rMN ⊕ rF A) = Ee×PKF A (rMN ⊕ rFA).